You are viewing a plain text version of this content. The canonical link for it is here.
Posted to builds@solr.apache.org by Apache Jenkins Server <je...@builds.apache.org> on 2023/10/15 12:09:46 UTC

[JENKINS] Solr » Solr-Check-main - Build # 8189 - Still Failing!

Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8189/

All tests passed

Build Log:
[...truncated 1440 lines...]
BUILD FAILED in 1h 2m 38s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/o4vgply5l6g3k

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8261 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8261/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([B6E24DF639530F76:8179B9E8019FD2D2]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.renewDelegationToken(TestSolrCloudWithDelegationTokens.java:136)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.verifyDelegationTokenRenew(TestSolrCloudWithDelegationTokens.java:346)
	at org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew(TestSolrCloudWithDelegationTokens.java:365)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1767 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41465/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 22:22:06.621; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 22:22:06.625; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41465/solr] to [https://127.0.0.1:41465].
# WARN  - 2023-10-27 22:22:07.620; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 22:22:07.653; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16608ms
ok 74 start solr with client truststore and security manager in 18844ms
not ok 75 start solr with mTLS needed in 53756ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-c3D6Ur/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41465 [|]   [/]   [-]   [\]
# Started Solr server on port 41465 (pid=897824). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41466 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 41466 (pid=897989). Happy searching!
#
#     INFO  - 2023-10-27 22:23:08.282; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 22:23:08.291; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 22:23:08.979; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:08.981; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:08.981; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:09.038 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 43 FA 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:54.000 UTC",
#     "not  after"         : "2024-01-25 22:22:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#         0010: B9 73 B9 04                                        .s..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:09.042 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 DD 85 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:46.000 UTC",
#     "not  after"         : "2024-01-25 22:22:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:09.055 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:09.985 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:09.985 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:09.991 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:09.991 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:09.995 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.023 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.023 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.023 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:10.025 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "30 05 FF 3C 9D 91 D9 68 1C 0E 41 97 CF 52 03 F3 BB D9 42 49 EA B0 99 64 E0 A8 07 2D 7A D2 A7 A8",
#   "session id"          : "33 38 DB 26 EA DD 2F 06 42 AC CE 72 BD DC BE 36 04 54 97 23 29 BA 01 A7 C9 EF 22 41 9F AE 17 66",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E6 AE F3 2D D1 A1 77 AD   F4 81 A6 AB DC 12 64 27  ...-..w.......d'
#             0010: 8A 75 49 16 CB 84 EC 36   0C D2 70 FE 7C F5 D7 51  .uI....6..p....Q
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.185 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A4 F8 4D 5A 9E 13 AA F7 30 D7 D5 6C 2E 02 1E 56 B7 0A E0 4F E4 4E 10 A8 DA DF 5C CE 6C 9F 30 91",
#   "session id"          : "33 38 DB 26 EA DD 2F 06 42 AC CE 72 BD DC BE 36 04 54 97 23 29 BA 01 A7 C9 EF 22 41 9F AE 17 66",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 5B B9 22 41 E3 C6 21 CD   D6 3A 18 BE 35 69 7B D5  [."A..!..:..5i..
#           0010: C6 AC 45 D7 51 4D C2 28   A5 6C 8A 35 9A C4 12 0D  ..E.QM.(.l.5....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.186 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.186 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.188 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.189 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.193 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.193 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.193 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.210 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.211 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.211 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:10.211 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.210 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.212 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.213 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.232 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.233 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.234 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.241 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.242 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.243 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.243 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.250 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.251 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.251 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.252 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.252 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.267 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 0D 01 8A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:50.000 UTC",
#       "not  after"         : "2024-01-25 22:22:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 18 C4 7A 39 0C 7A 85   E2 07 FD E5 81 7C E4 D8  ...z9.z.........
#           0010: 35 BE 12 33                                        5..3
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.267 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.323 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.326 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2C 22 A4 D7 0B 9B FC 4A   6F 43 5F 8B 54 1C FD 0D  ,".....JoC_.T...
#     0010: 40 8B ED 1C C1 CF 42 64   A5 C4 D0 D8 82 DB 91 1C  @.....Bd........
#     0020: 81 97 1D F3 3D EE 2F 25   4A F6 EA 72 C8 C7 DE 86  ....=./%J..r....
#     0030: B7 4E 04 02 A9 FA 64 77   4B 28 A0 DE 0B 4A 46 53  .N....dwK(...JFS
#     0040: F3 EC E5 53 1C 4A A3 40   B1 8A 87 08 D4 DC 27 2E  ...S.J.@......'.
#     0050: 7A 47 EE 9A A6 5E 26 19   95 E2 86 75 A2 90 4A 45  zG...^&....u..JE
#     0060: 25 69 ED F6 5B B4 C0 65   7F 27 79 EC 93 DD 52 D9  %i..[..e.'y...R.
#     0070: 5B 51 EE 08 24 41 CF C3   7B 86 4C EE 49 24 03 88  [Q..$A....L.I$..
#     0080: BE 8B 9B DF 3E 96 E6 D6   F4 50 86 01 D2 4E A4 CE  ....>....P...N..
#     0090: EC 6A 1E E6 99 E7 74 BD   97 9A A9 88 27 56 6D 82  .j....t.....'Vm.
#     00A0: 12 F8 49 66 B4 EB 32 94   91 44 BC AD B6 E2 7A FA  ..If..2..D....z.
#     00B0: 9C 15 76 E8 12 05 6F 55   CB 1B 24 EE 6E 49 A3 DA  ..v...oU..$.nI..
#     00C0: 5E 5E 4F 90 6A 0B 20 44   42 09 95 D0 88 B7 52 11  ^^O.j. DB.....R.
#     00D0: 9D DC 99 43 9A 86 51 19   E3 F3 88 95 40 12 18 C8  ...C..Q.....@...
#     00E0: 3E 9D 55 27 9B F9 10 74   0D FB D1 85 FA 7C 45 CD  >.U'...t......E.
#     00F0: 78 C4 F3 0E 70 EF 7C 39   BF 06 16 DA F0 48 16 CB  x...p..9.....H..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.327 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A1 A5 D4 C9 DA 92 40 12   91 8B D8 8B 28 15 CE 2D  ......@.....(..-
#     0010: 11 76 6A 08 3D B6 54 AD   CD 60 2B 5B CA 4A 3C DD  .vj.=.T..`+[.J<.
#     0020: 36 AF 6B 1A 6A 67 CB 16   71 7A 92 61 F9 BC 6B BB  6.k.jg..qz.a..k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.336 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:10.337 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.337 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.338 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.349 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 43 FA 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:54.000 UTC",
#       "not  after"         : "2024-01-25 22:22:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#           0010: B9 73 B9 04                                        .s..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 12 04 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:48.000 UTC",
#       "not  after"         : "2024-01-25 22:22:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.410 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 66 8E 9E 7E B5 73 15   07 2B 46 73 3F A6 54 72  Uf....s..+Fs?.Tr
#     0010: 4D 13 FE 08 0C 2B 6E A0   0E A6 92 1A BC F9 99 B8  M....+n.........
#     0020: 8D 15 5C 2F 9F 54 B1 82   F1 BD 8A 16 A5 E8 3F 57  ..\/.T........?W
#     0030: 11 00 D0 DB 5A 07 E7 29   97 62 7D EA DB F5 95 00  ....Z..).b......
#     0040: BC 66 C9 39 8F 4E AE E0   45 CE 5D 51 42 D4 73 E7  .f.9.N..E.]QB.s.
#     0050: 58 B9 5E 15 3A E8 9E EF   23 36 7C 73 31 09 87 66  X.^.:...#6.s1..f
#     0060: 82 6D CB 44 59 69 02 8D   3E C8 E9 BB 33 FD 4A 2C  .m.DYi..>...3.J,
#     0070: 45 E0 72 07 C6 3E 83 CA   CA 46 10 FC D9 8E BC 2E  E.r..>...F......
#     0080: BE 67 B8 66 BD BA 81 B9   AF E8 D5 2A 6D 7C AA 50  .g.f.......*m..P
#     0090: E1 09 56 A7 C3 7C D7 DC   5A 10 DC 52 4F 5F 5C 54  ..V.....Z..RO_\T
#     00A0: D0 5D 5C DF FA 63 D7 75   C2 07 D0 20 B7 3B EE BF  .]\..c.u... .;..
#     00B0: 40 58 11 89 31 D3 D0 ED   BF 15 D6 79 2E E2 BC E7  @X..1......y....
#     00C0: 60 79 BF A9 E1 32 46 97   7F 53 91 95 A2 22 9F E7  `y...2F..S..."..
#     00D0: CC 29 FA 14 06 1B C0 62   7F 3F 79 32 C6 B6 01 97  .).....b.?y2....
#     00E0: 54 F6 69 45 13 02 D9 A2   75 F0 20 74 D6 23 12 98  T.iE....u. t.#..
#     00F0: A6 80 B1 84 4D 5C 93 35   40 F0 85 59 28 74 6B D7  ....M\.5@..Y(tk.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.411 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 88 1A FD D7 B4 96 49 4F   9F 27 09 8C 82 35 5D 9F  ......IO.'...5].
#     0010: 8C 8E A4 8A 87 61 26 D5   59 98 DE 06 BB 0C 2B 21  .....a&.Y.....+!
#     0020: 95 CA E3 7B F6 B6 6A 73   26 B8 FA 9C 85 E9 11 ED  ......js&.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.414 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:10.517 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "A7 7F 32 B0 86 04 DC 17 8B E0 57 D4 B2 C3 49 00 B8 4D 5E A1 EF B9 E9 C5 E3 B5 E9 1B 5D 19 0B D5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 22:23:11.273 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 22:23:11.273 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 22:23:12.526; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 22:23:12.536; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 22:23:12.881; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:12.882; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 22:23:12.883; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-c3D6Ur/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:12.912 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "78 43 FA 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:54.000 UTC",
#     "not  after"         : "2024-01-25 22:22:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#         0010: B9 73 B9 04                                        .s..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:12.915 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "63 DD 85 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:46.000 UTC",
#     "not  after"         : "2024-01-25 22:22:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:12.926 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:13.240 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.241 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:13.242 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:13.242 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.246 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.255 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.255 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.256 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:13.257 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "D6 4C C1 91 8A 04 85 65 85 87 35 36 05 B8 36 E0 EF 10 A9 08 6E 79 8A A0 CB 73 87 05 4D 7C 3D C8",
#   "session id"          : "A1 F6 2F 90 AB A8 F7 F6 E1 0C 02 14 CF 1B 46 9E 68 86 C5 03 79 14 D8 2B B4 15 98 84 E1 5F AE EC",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2C F6 81 56 A9 0D 41 5D   05 62 5C 1C EF A8 17 E8  ,..V..A].b\.....
#             0010: 5F F4 04 32 23 61 7B 67   C3 29 23 22 5F A4 D8 08  _..2#a.g.)#"_...
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.357 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E4 CC 45 75 1B BA 89 81 18 F1 78 2C EC 7C 41 D0 80 05 6A AC F1 44 8A B5 1E B8 27 4C 00 37 3E 03",
#   "session id"          : "A1 F6 2F 90 AB A8 F7 F6 E1 0C 02 14 CF 1B 46 9E 68 86 C5 03 79 14 D8 2B B4 15 98 84 E1 5F AE EC",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: E6 4C C9 0A 1F 64 91 A6   1C D2 B5 D7 70 EC D4 4B  .L...d......p..K
#           0010: 29 6E A1 2A 6C 7E 8C 58   85 BB 90 0B E1 4B 1B 35  )n.*l..X.....K.5
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.357 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.357 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.363 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.365 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.370 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.371 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.371 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.371 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.376 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.377 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.383 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.386 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.387 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.388 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.388 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.388 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.389 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.389 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.390 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.390 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.403 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 0D 01 8A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:50.000 UTC",
#       "not  after"         : "2024-01-25 22:22:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 18 C4 7A 39 0C 7A 85   E2 07 FD E5 81 7C E4 D8  ...z9.z.........
#           0010: 35 BE 12 33                                        5..3
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.403 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:23:13.463 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.474 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 12 04 7B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 22:22:48.000 UTC",
#     "not  after"         : "2024-01-25 22:22:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#         0010: A8 8E FD CE                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#         0010: 74 DB 9E 1E                                        t...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.477 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 CD 20 9F A9 E5 A6 55   B8 6E D0 36 B2 41 95 21  V. ....U.n.6.A.!
#     0010: 8E BF 94 54 75 2F 98 8D   B4 E6 0F D2 DA 9E AD 91  ...Tu/..........
#     0020: CB 02 FE 6A 58 94 7A 50   51 99 6B 24 CC FE F2 C5  ...jX.zPQ.k$....
#     0030: 0D 50 BF D0 96 49 EF 4C   2D B6 96 20 8D 91 5B F4  .P...I.L-.. ..[.
#     0040: 35 62 68 3F 29 39 FE FB   70 CA 2B FC F6 D8 E8 76  5bh?)9..p.+....v
#     0050: 37 82 54 B2 7E F9 E9 2F   8C 84 8D F4 90 E9 49 25  7.T..../......I%
#     0060: 93 93 EC 1C C0 49 AB 30   38 86 75 D8 F0 4C 81 7A  .....I.08.u..L.z
#     0070: D0 69 05 4E F2 FD 4B 56   92 46 5B F8 B7 48 B3 0C  .i.N..KV.F[..H..
#     0080: 37 2A B9 6B CD B9 67 05   A8 B5 B4 1B 62 CE 40 74  7*.k..g.....b.@t
#     0090: C7 55 CE B8 C2 DE F5 04   C5 F3 8A 89 20 7F B5 D4  .U.......... ...
#     00A0: 81 73 43 97 B9 B1 FA 1F   78 64 90 68 B4 2D 9A B6  .sC.....xd.h.-..
#     00B0: BE A1 67 E3 F1 07 DB 90   AA 2E F1 ED C5 B2 CB 2B  ..g............+
#     00C0: DF EA 46 D9 48 79 E0 96   5A 8A FB F4 0A B3 20 C9  ..F.Hy..Z..... .
#     00D0: 1B 6A 57 D0 83 EA 2D 1E   D6 A6 BF C3 F8 4A C4 D2  .jW...-......J..
#     00E0: 89 DE DA 48 A8 1F B8 A5   16 39 25 B6 D5 D3 0E B0  ...H.....9%.....
#     00F0: 18 A0 04 AE A9 A0 B1 25   18 A6 8B C3 CB 13 56 6A  .......%......Vj
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.478 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 81 F2 8D 24 BA 66 3F FF   B9 A2 3A 7D EC 1E FE 00  ...$.f?...:.....
#     0010: E4 D7 BF C9 09 18 1B 82   78 5E A1 BB 76 15 6D FB  ........x^..v.m.
#     0020: 15 98 CA F8 41 1F B0 98   F5 83 1A 30 7F 3D 31 18  ....A......0.=1.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.480 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:13.480 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.481 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.483 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 43 FA 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:54.000 UTC",
#       "not  after"         : "2024-01-25 22:22:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DA D5 DC 89 99 6C 0E DD   2A 18 9A E6 CC 8C 17 AE  .....l..*.......
#           0010: B9 73 B9 04                                        .s..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 12 04 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:48.000 UTC",
#       "not  after"         : "2024-01-25 22:22:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.505 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 2D B9 EA F1 F4 79 90   03 D1 E4 B8 30 A9 99 91  5-....y.....0...
#     0010: F6 A8 67 81 5F 89 FE EA   32 3B 18 4C FE 6C F4 DA  ..g._...2;.L.l..
#     0020: E6 A9 A9 8F 3A 30 2A 7B   EF 01 CF 14 2D BB B0 22  ....:0*.....-.."
#     0030: 0B 0E AE 56 D1 2F F0 49   AD 3E 77 4E 78 BC B8 50  ...V./.I.>wNx..P
#     0040: 32 1D 47 CD 5F 0E 1E 8B   A2 9C CC 27 3B B8 EC DB  2.G._......';...
#     0050: 2B 68 C7 95 45 D9 2F A6   68 4A 65 DE 11 45 3F AF  +h..E./.hJe..E?.
#     0060: 11 1E BF F4 33 41 CD ED   8E EE 28 99 48 92 91 3A  ....3A....(.H..:
#     0070: FF 4D 14 27 09 2A E4 5A   70 ED 8A C8 4C FB 98 A2  .M.'.*.Zp...L...
#     0080: D8 26 31 18 FA 18 A2 DA   EB 0D 06 63 B1 9A 9B CD  .&1........c....
#     0090: EC 73 24 CF 36 DA DC F6   32 3A 13 2C 77 6D 4F DC  .s$.6...2:.,wmO.
#     00A0: 48 A0 B1 28 77 86 20 DD   CA AE 98 11 57 CF 53 8E  H..(w. .....W.S.
#     00B0: A6 08 B7 B2 10 6F 0E FA   EC 08 AE 4C 3B 1F 1A FC  .....o.....L;...
#     00C0: 49 98 23 8E 9B D1 A7 FA   29 9B 52 FB 19 8C 34 AC  I.#.....).R...4.
#     00D0: 47 F6 1A 09 CA 99 3E 41   C0 BC 03 88 C6 A6 F3 EA  G.....>A........
#     00E0: B7 FF 91 25 07 9C 7A 30   FC A3 5A 6C AB 6B 80 5F  ...%..z0..Zl.k._
#     00F0: 64 6F ED E7 11 85 2D BA   56 0E B2 98 46 B0 D6 77  do....-.V...F..w
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.506 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 01 CE 90 94 2C 6D 8A 97   50 8B D3 99 9F 04 97 EF  ....,m..P.......
#     0010: 16 0F E3 9C 46 74 FC 57   CE B3 6B 14 0D 10 93 1A  ....Ft.W..k.....
#     0020: 61 46 CA 48 DF 9F E0 74   61 38 25 61 DF 5A BA 69  aF.H...ta8%a.Z.i
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.506 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:13.965 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5B 48 5A 27 C2 A8 81 C6 E4 71 C5 28 9F 4E DA 60 6E 64 B9 08 F6 02 96 9F A6 C6 07 D3 95 F8 B0 24",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 22:23:14.225 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 22:23:14.226 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 22:23:26.957; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:27.294 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 12 04 7B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:48.000 UTC",
#       "not  after"         : "2024-01-25 22:22:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 42 F2 7D 30 34 0D D8 20   01 DD 82 33 5E 5E E8 68  B..04.. ...3^^.h
#           0010: 74 DB 9E 1E                                        t...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "63 DD 85 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 22:22:46.000 UTC",
#       "not  after"         : "2024-01-25 22:22:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AD 17 59 0D 4E C0 C5 6B   9B 4F E7 48 C7 70 D1 AE  ..Y.N..k.O.H.p..
#           0010: A8 8E FD CE                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 22:23:27.317 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:27.482 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.482 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:27.483 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 22:23:27.483 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.487 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.496 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.496 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 22:23:27.498 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "B5 38 18 05 1D E2 01 65 E6 B1 64 2E E5 8C B4 0A 17 98 A9 EE 68 6B 8B AE 5B 6E CA E9 C8 C0 38 AC",
#     "session id"          : "E6 97 F9 83 93 12 CE E7 E0 62 2C 35 0E B4 04 0D 27 82 D7 6B 87 97 71 7B 01 84 98 B9 1C 86 13 F6",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 0A 1B 02 FE 66 1F FE 81   B7 43 49 C0 F5 79 BA 9A  ....f....CI..y..
#               0010: CC 79 06 A4 BF 11 82 7C   12 F5 AF 7D 91 EC C9 25  .y.............%
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.510 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D5 C9 CB 69 CE 33 BD 9B 8D B5 67 41 9A F6 6D 4E 9D 0D FB EB 4D B3 A2 00 23 CA BE 76 3C 86 09 8C",
#     "session id"          : "E6 97 F9 83 93 12 CE E7 E0 62 2C 35 0E B4 04 0D 27 82 D7 6B 87 97 71 7B 01 84 98 B9 1C 86 13 F6",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 71 5E EA 65 AD B4 E5 91   31 41 A6 1B 09 85 80 F4  q^.e....1A......
#             0010: EE A9 54 C4 6B 8E 29 63   73 3E C9 57 A5 33 F8 03  ..T.k.)cs>.W.3..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.511 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.511 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.512 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.518 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.518 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.519 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.519 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.519 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 22:23:27.520 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thr

[...truncated too long message...]

n.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 22:24:53.252 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.282 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.283 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 22:24:53.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41466/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 13602ms
ok 78 stop command for single port in 17342ms
ok 79 status detects locally running solr in 9246ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 6895ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 990ms
ok 82 listing out files in 2591ms
ok 83 copying files around in 6089ms
ok 84 upconfig in 2523ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1215ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1210ms
ok 87 Cleanup in 1951ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestSolrCloudWithDelegationTokens.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=B6E24DF639530F76 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 43s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/lopy3vznfho62

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8260 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8260/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43611/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 16:27:40.910; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 16:27:40.914; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:43611/solr] to [https://127.0.0.1:43611].
# WARN  - 2023-10-27 16:27:41.851; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 16:27:41.882; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16772ms
ok 74 start solr with client truststore and security manager in 19312ms
not ok 75 start solr with mTLS needed in 54010ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-hupojE/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43611 [|]   [/]   [-]   [\]
# Started Solr server on port 43611 (pid=262829). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43612 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 43612 (pid=262935). Happy searching!
#
#     INFO  - 2023-10-27 16:28:44.742; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 16:28:44.747; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 16:28:45.745; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:45.747; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:45.755; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:45.840 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 30 C6 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:29.000 UTC",
#     "not  after"         : "2024-01-25 16:28:29.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#         0010: 1E AF A5 1D                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:45.848 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 A7 B3 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:21.000 UTC",
#     "not  after"         : "2024-01-25 16:28:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:45.875 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:46.294 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.294 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:46.296 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:46.296 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.305 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.323 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:46.325 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "03 5B AB CA 87 32 4D 5D E7 F4 86 97 7A 16 29 D8 92 A5 B2 7F B7 92 54 C1 D8 EE 24 7A AF F0 8D CD",
#   "session id"          : "04 38 C6 60 B4 52 1E 67 7C C8 45 CD 49 9D 0B 35 53 68 68 27 BA 14 4B 6F 01 19 CB DF 35 85 3B 1A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EB 8D 65 AF 3A 15 BA 80   69 E9 80 B2 5A 1B 4D 9B  ..e.:...i...Z.M.
#             0010: 80 E1 8A 10 CC 99 3D 73   5E 5E E6 F3 80 42 29 21  ......=s^^...B)!
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.687 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B6 55 AF AA 58 7E E9 4B 01 13 6E AF B0 27 A2 22 54 0A 98 C5 89 52 28 72 8B F0 29 9E 70 62 AE 0A",
#   "session id"          : "04 38 C6 60 B4 52 1E 67 7C C8 45 CD 49 9D 0B 35 53 68 68 27 BA 14 4B 6F 01 19 CB DF 35 85 3B 1A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 95 80 59 5C 04 CC CF 12   88 97 89 8A F0 0F 88 36  ..Y\...........6
#           0010: 3E 17 1C 8F C9 53 0D B9   7E 7C F2 9A 94 5E BC 12  >....S.......^..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.688 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.688 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.689 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.694 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.695 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.710 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.711 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.712 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.715 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.715 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.716 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.717 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.717 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.717 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.718 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.718 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.719 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.719 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.731 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 C7 1C FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:25.000 UTC",
#       "not  after"         : "2024-01-25 16:28:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 97 B8 08 36 A9 28 90   84 D2 03 85 1C F2 12 CC  Y...6.(.........
#           0010: D0 33 94 12                                        .3..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.731 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.788 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.788 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.789 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:46.789 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.815 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.817 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 83 81 DE 65 29 72 3A   FD BD 9F AB C8 FB 74 47  D...e)r:......tG
#     0010: 82 97 E3 96 96 E5 D5 C5   53 63 A1 CB 2C 2C 2F 18  ........Sc..,,/.
#     0020: ED 1F AE 21 03 30 C8 68   2A 67 90 1C BA ED 54 14  ...!.0.h*g....T.
#     0030: 20 CE FD A9 7F 11 53 7E   C8 D4 A7 2C DB E5 3F 45   .....S....,..?E
#     0040: 4C 14 F4 D2 A5 5D D4 93   A0 64 7E 33 1D 00 77 74  L....]...d.3..wt
#     0050: 56 E2 7E 00 CD 21 ED A3   4D 93 B3 3A 73 B0 B8 19  V....!..M..:s...
#     0060: 54 96 FC 27 C6 BC 2F 2D   4D 8F B2 9F 4D 6D 77 D3  T..'../-M...Mmw.
#     0070: 16 E7 B4 AD 56 0E 8F 4D   27 69 2D 82 38 13 79 ED  ....V..M'i-.8.y.
#     0080: 6A F1 F8 E4 ED F9 C4 3B   AC 5E 5C 35 7A 10 48 FD  j......;.^\5z.H.
#     0090: 04 40 C1 A4 5C BC 56 CD   2A 2C 72 CB 0F 3C C2 6C  .@..\.V.*,r..<.l
#     00A0: 64 9C 88 48 BE C4 3D 66   EA 17 B2 D3 C5 BE CD A5  d..H..=f........
#     00B0: E8 5C C6 36 30 CE A5 0A   C7 1A B4 5F 38 A9 E5 FA  .\.60......_8...
#     00C0: 77 30 0F 97 0A 30 76 52   E0 6F 1E A1 E4 2C 2B E6  w0...0vR.o...,+.
#     00D0: 79 6E 3B 10 CA 82 B3 D4   D5 D6 AC 42 F1 38 EE 20  yn;........B.8.
#     00E0: 74 A1 EE 23 8A CD 92 7D   8E C0 5C 09 EC 1F D5 AF  t..#......\.....
#     00F0: AD 81 10 B8 8C E7 48 F7   1B 18 2D 3B AD AE 55 E2  ......H...-;..U.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.818 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 39 75 F2 1B FD 6D A8 AA   63 04 78 1A 0B EA 60 A9  9u...m..c.x...`.
#     0010: 2A A2 ED 33 6C 80 66 78   84 2A E8 A0 3F 9E 3F C5  *..3l.fx.*..?.?.
#     0020: 85 09 DE DC 9D EA 6F D4   F4 6F B4 6F F1 FA AC 52  ......o..o.o...R
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.820 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.821 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.823 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 30 C6 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:29.000 UTC",
#       "not  after"         : "2024-01-25 16:28:29.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#           0010: 1E AF A5 1D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 7A 0C 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:23.000 UTC",
#       "not  after"         : "2024-01-25 16:28:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.844 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 3D FA 39 AF E0 35 A6   7A DC 3F 2C 45 7C 58 3A  2=.9..5.z.?,E.X:
#     0010: 83 8D 10 CF C0 03 BF 02   07 D2 7F 21 05 AF 99 77  ...........!...w
#     0020: 9A 11 65 96 8C F9 2A B3   2F 89 37 F2 B2 02 61 CA  ..e...*./.7...a.
#     0030: 21 81 C3 0E CA A2 95 0F   D3 B6 BF 33 12 C6 57 30  !..........3..W0
#     0040: 7C 18 1F D2 61 B7 40 74   BD 94 2E F7 20 2B 03 F2  ....a.@t.... +..
#     0050: C2 1B 75 88 39 51 AD 77   86 69 5B 9D 01 F8 B9 8D  ..u.9Q.w.i[.....
#     0060: 87 40 2E 81 BA 58 B6 95   4D E4 3D 10 EA 20 DF E0  .@...X..M.=.. ..
#     0070: 68 39 42 BC 1B 98 4C 82   B9 6E 53 27 1E E5 D3 BA  h9B...L..nS'....
#     0080: 43 02 73 91 FF E3 CA 3F   30 1C 54 2D F6 1C C4 AE  C.s....?0.T-....
#     0090: 74 5B 7F D3 38 93 AB D0   A2 FD 3E 8C A1 D8 F6 2C  t[..8.....>....,
#     00A0: 7F 36 EC A3 B5 20 BA A4   DC FB 25 EF CB 1B D1 D4  .6... ....%.....
#     00B0: E1 FD AC AD 6E 4E D2 39   16 7F C6 D1 FC 2D B2 8A  ....nN.9.....-..
#     00C0: 16 44 A8 B8 C6 F8 A6 AE   5D 62 BA C1 25 53 5A E0  .D......]b..%SZ.
#     00D0: 65 1D 29 2D D3 EF 34 10   21 0A 5D B4 CA 90 EF 2C  e.)-..4.!.]....,
#     00E0: F1 16 87 6F D3 E1 90 24   08 A0 40 DD CF 34 76 4B  ...o...$..@..4vK
#     00F0: 85 78 FF CF 2C C6 96 3B   64 80 25 31 79 68 84 A0  .x..,..;d.%1yh..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.845 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B D7 9B 90 38 3F D6 0B   91 F6 15 B7 BE 01 54 14  ....8?........T.
#     0010: 27 42 A1 37 FE E1 EB 9C   D7 F8 76 9F 02 12 5C 9B  'B.7......v...\.
#     0020: F1 65 98 F9 CD BF 1F 3F   45 EC 85 0D 55 8C 44 3D  .e.....?E...U.D=
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.846 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:46.911 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "DD 65 DA D7 C3 05 D3 A7 50 3A 88 8B 24 D8 D8 5E EA E5 F7 45 A7 B2 7F 37 98 E8 D9 53 49 47 5C 45",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 16:28:47.152 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 16:28:47.153 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 16:28:48.274; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 16:28:48.277; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 16:28:48.588; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:48.590; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 16:28:48.591; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6175619b(ca,h=[localhost],a=[],w=[]) for Client@119f1f2a[provider=null,keyStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-hupojE/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:48.626 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3C 30 C6 47",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:29.000 UTC",
#     "not  after"         : "2024-01-25 16:28:29.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#         0010: 1E AF A5 1D                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:48.629 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "74 A7 B3 0E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:21.000 UTC",
#     "not  after"         : "2024-01-25 16:28:21.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 16:28:48.640 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:48.802 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.802 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:48.804 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:28:48.804 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.808 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.819 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.819 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.819 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:28:48.821 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E6 67 62 5E 94 49 FB 50 80 6E A2 2B 21 5A B7 BE 2B C6 F3 8C 45 5B 52 16 E8 D6 47 8A 02 00 BD 64",
#   "session id"          : "35 56 D2 B0 AF 0A 64 D3 EB 9C 11 C0 E3 E6 BD 74 3A CA 4D A6 C5 B8 6D 66 0B F7 D3 88 26 EB 37 6E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: F7 3F 75 33 81 79 FF 70   BA 2E 4E 9D 00 9D 52 15  .?u3.y.p..N...R.
#             0010: 42 38 51 8E DD 62 34 8C   F8 46 E9 09 19 64 C5 15  B8Q..b4..F...d..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.926 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "91 D6 01 80 02 3A 8A 62 02 15 0F F9 67 F2 FF 8A 30 96 F1 40 95 11 6D 4D 12 50 A2 E3 D0 4F D8 F1",
#   "session id"          : "35 56 D2 B0 AF 0A 64 D3 EB 9C 11 C0 E3 E6 BD 74 3A CA 4D A6 C5 B8 6D 66 0B F7 D3 88 26 EB 37 6E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 93 BF F6 22 AD B9 B3 C1   00 0D 11 A3 F3 CF E5 90  ..."............
#           0010: D5 4E 33 1A 3B CA 8A AF   56 62 95 68 87 A0 75 65  .N3.;...Vb.h..ue
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.926 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.926 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.928 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.940 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.941 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.943 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.950 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.951 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.953 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.954 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.955 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:48.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.957 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "78 C7 1C FA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:25.000 UTC",
#       "not  after"         : "2024-01-25 16:28:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 59 97 B8 08 36 A9 28 90   84 D2 03 85 1C F2 12 CC  Y...6.(.........
#           0010: D0 33 94 12                                        .3..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:48.957 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 16:28:49.488 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.499 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 7A 0C 59",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 16:28:23.000 UTC",
#     "not  after"         : "2024-01-25 16:28:23.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#         0010: E4 EF 4A 9D                                        ..J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#         0010: 7E 38 E6 36                                        .8.6
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.502 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 6C DD A4 E8 13 57 C3   C7 EC 84 DD 27 B2 7E 06  vl....W.....'...
#     0010: 5C DF 6C 93 90 51 1F 6A   2B EE 0D 89 86 87 BE 3F  \.l..Q.j+......?
#     0020: 17 1C 47 25 42 2D 84 73   DE 9D 78 D0 15 F6 9E 72  ..G%B-.s..x....r
#     0030: 20 AC F7 9B 55 2A 22 B7   F6 06 2E 67 0C A9 43 B8   ...U*"....g..C.
#     0040: F6 34 A2 70 B7 3C E8 37   82 04 09 3E 6E 06 64 67  .4.p.<.7...>n.dg
#     0050: B7 5F 92 38 59 98 08 7D   B8 C6 E7 E1 D5 D8 02 ED  ._.8Y...........
#     0060: A7 08 54 C5 77 82 81 01   FA 76 16 FC B3 36 65 15  ..T.w....v...6e.
#     0070: D4 08 F9 49 DA 74 6D DE   BD FB 77 E8 A7 2A BD 65  ...I.tm...w..*.e
#     0080: DF F5 60 2A 9E 45 E4 7C   8C 56 16 FB 47 67 F3 E9  ..`*.E...V..Gg..
#     0090: 48 92 42 F2 29 5C 06 0B   C3 8F 82 94 03 6B CB 7E  H.B.)\.......k..
#     00A0: 62 51 67 47 F2 8F 6C 1A   9E BD EF AC 4E C9 66 98  bQgG..l.....N.f.
#     00B0: 42 9F 81 FF E5 0B 17 37   1A 91 C0 69 4D 73 22 6F  B......7...iMs"o
#     00C0: FC 00 C3 AB 73 50 9D B3   56 EF C6 C8 34 83 BF 47  ....sP..V...4..G
#     00D0: D7 64 DB 5C 3A BB 49 77   35 77 30 3B 1D 91 27 2E  .d.\:.Iw5w0;..'.
#     00E0: 5C DF 9D EA 03 6B 0D 26   56 FA C6 BC DE 9E 87 A6  \....k.&V.......
#     00F0: 96 E5 73 B0 CF 20 18 24   3B FB 39 1F 52 4B D4 FB  ..s.. .$;.9.RK..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.504 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B6 07 93 7F 3C D8 9F 37   31 E8 0F 40 83 32 50 80  ....<..71..@.2P.
#     0010: 27 24 CE 80 EA F6 A2 D7   0C AB 2E CB 6A B0 3C E8  '$..........j.<.
#     0020: D2 83 F4 96 10 6C 04 D1   B9 E5 8D 9F 62 CF 6B CB  .....l......b.k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.505 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:28:49.506 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.507 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.510 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3C 30 C6 47",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:29.000 UTC",
#       "not  after"         : "2024-01-25 16:28:29.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 26 3B 97 7A E2 8F 4E F8   EA 13 10 7E 3B 33 58 75  &;.z..N.....;3Xu
#           0010: 1E AF A5 1D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 7A 0C 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:23.000 UTC",
#       "not  after"         : "2024-01-25 16:28:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.531 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 42 C5 BC A0 C6 B0 EF   73 3A D2 9A 73 72 C9 7D  xB......s:..sr..
#     0010: 70 EF 92 45 AE 7C 5B 6C   92 5F 2F 7F 44 6F 69 15  p..E..[l._/.Doi.
#     0020: 7D 84 92 81 82 E9 9E 80   43 FF 31 62 04 1E 71 5F  ........C.1b..q_
#     0030: 55 9B 42 17 83 8C 7A 6C   3C BF 5F CD 63 94 E6 B6  U.B...zl<._.c...
#     0040: 01 E4 ED D1 BE 96 80 44   0F 94 29 BB DB 7E 67 AD  .......D..)...g.
#     0050: B3 82 C4 4E 07 3E F0 1A   B8 35 E5 D4 00 48 FE 92  ...N.>...5...H..
#     0060: 7B 39 C3 11 45 83 51 6D   E4 87 65 09 9B 0F C8 24  .9..E.Qm..e....$
#     0070: 47 B9 8C D4 72 16 7C 74   B7 78 A1 F2 CE 60 53 FA  G...r..t.x...`S.
#     0080: A2 71 DE 0F 05 D4 E7 25   C7 1D 35 C9 B9 57 45 FB  .q.....%..5..WE.
#     0090: E0 1C D3 F1 61 15 93 1E   0B 21 9C 2D 7A EB 11 D5  ....a....!.-z...
#     00A0: 21 02 9A CD 43 1F E0 1A   EF E2 C0 DD 56 28 37 03  !...C.......V(7.
#     00B0: 0C 15 A9 8A B8 29 8A E5   0B 50 4B B2 EA 49 35 37  .....)...PK..I57
#     00C0: 3F 9E DC BC 24 20 6B 60   AF 44 A2 59 40 BE 65 28  ?...$ k`.D.Y@.e(
#     00D0: 18 18 1D B9 B1 EB DC 62   0F 87 2B C3 B7 35 EC 02  .......b..+..5..
#     00E0: D9 AF 1D 82 B9 27 D3 FE   85 7B 35 CA 4E 09 52 82  .....'....5.N.R.
#     00F0: 8A AC 57 E9 C7 E5 4F B0   CB C0 5A A5 C5 ED B6 B3  ..W...O...Z.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.532 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3C 34 03 65 08 71 BA CA   AE 40 9F FE 41 27 E7 34  <4.e.q...@..A'.4
#     0010: 31 6B 5D 3C D9 E3 04 FA   12 3E EB AA 5E 1A 29 64  1k]<.....>..^.)d
#     0020: 05 03 E4 EA EB EA 72 0D   7A EF AC FD 0D F0 DE 8A  ......r.z.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.533 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:28:49.590 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "17 BA 21 2B 14 52 65 A0 F4 3E F4 E6 6B A3 8E E2 59 F9 50 65 D4 BF 49 74 FC D5 26 03 C8 FD 40 66",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 16:28:49.832 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 16:28:49.833 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 16:29:02.914; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 16:29:03.314 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "74 A7 B3 0E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:21.000 UTC",
#       "not  after"         : "2024-01-25 16:28:21.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 7A 0C 59",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 16:28:23.000 UTC",
#       "not  after"         : "2024-01-25 16:28:23.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 7B 6A 07 88 84 76 E6   B1 50 61 C1 B5 F5 67 52  q.j...v..Pa...gR
#           0010: E4 EF 4A 9D                                        ..J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 7C AA B3 65 A3 A5 7B AE   23 7E 42 C1 E2 4A E5 96  ...e....#.B..J..
#           0010: 7E 38 E6 36                                        .8.6
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 16:29:03.325 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:29:03.561 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.561 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:29:03.563 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 16:29:03.563 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.567 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.577 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.577 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.577 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 16:29:03.579 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "D6 6D 25 93 60 E0 FB 03 63 90 64 AF 22 C2 0E 2F 2B FF 91 5A 62 06 F5 81 1E 4F 1F 6D 0E 91 84 5B",
#     "session id"          : "83 67 8C 4A D4 A5 39 3F 8A 9D 8A A8 CA 3B 35 63 EE A9 53 C9 D7 4B 1C 45 3B C6 1D 67 DB F0 45 6F",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 3B EE 46 AD 53 94 61 6E   40 E8 73 BE 1A 8E 7B EE  ;.F.S.an@.s.....
#               0010: E0 22 01 59 99 40 39 BE   28 B3 99 A0 7D 8C 16 25  .".Y.@9.(......%
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.595 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "32 0B 92 F0 2E 42 AF 18 13 B4 3D E0 56 6C 0F 00 D1 63 45 AF B9 36 42 B6 52 45 EC A0 DB 3C 75 F4",
#     "session id"          : "83 67 8C 4A D4 A5 39 3F 8A 9D 8A A8 CA 3B 35 63 EE A9 53 C9 D7 4B 1C 45 3B C6 1D 67 DB F0 45 6F",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 49 5F 14 48 41 43 D3 50   2F 5B AD 58 02 2A AF 69  I_.HAC.P/[.X.*.i
#             0010: C8 2A 2C B2 96 8C 47 1D   F1 20 F6 43 4B 3C C3 66  .*,...G.. .CK<.f
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.596 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.596 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.597 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.598 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.598 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.601 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.610 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.611 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.612 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.615 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.616 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.617 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.618 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 16:29:03.619 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:29:03.619 UTC|SSLExtensions.java:215|Ignore impact of

[...truncated too long message...]

ty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 16:30:15.540 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43612/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14034ms
ok 78 stop command for single port in 17277ms
ok 79 status detects locally running solr in 8913ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7666ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 984ms
ok 82 listing out files in 2870ms
ok 83 copying files around in 6150ms
ok 84 upconfig in 2463ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1220ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1219ms
ok 87 Cleanup in 1959ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 33s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7eofzritbgbuy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8259 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8259/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:37031/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 12:58:04.632; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:58:04.636; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:37031/solr] to [https://127.0.0.1:37031].
# WARN  - 2023-10-27 12:58:05.770; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 12:58:05.820; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16272ms
ok 74 start solr with client truststore and security manager in 19120ms
not ok 75 start solr with mTLS needed in 53933ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-lxoFfn/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 37031 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37031 (pid=3786610). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 37032 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 37032 (pid=3786717). Happy searching!
#
#     INFO  - 2023-10-27 12:59:06.582; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:59:06.597; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 12:59:07.962; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:07.964; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fd4acee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:07.965; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@165b8a71(ca,h=[localhost],a=[],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:08.031 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4F 16 8A BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:52.000 UTC",
#     "not  after"         : "2024-01-25 12:58:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#         0010: FC F6 4D 89                                        ..M.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:08.034 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B F2 AD F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:44.000 UTC",
#     "not  after"         : "2024-01-25 12:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:08.050 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:08.251 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.251 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:08.266 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:08.267 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:08.267 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.286 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.318 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.318 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.318 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:08.324 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "8A 2A 4D DF 3B 8C EE 40 00 80 B5 54 91 76 A3 D4 14 1F FC 15 D5 EE 2E 0D A9 F2 68 92 CD FA 70 02",
#   "session id"          : "74 44 7B 69 75 E5 6A 5B 89 96 A8 3F F8 4B D6 36 34 CE 7B 5B C9 DF 34 1D 34 1C 0E C8 C4 8B D9 F0",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1E EA A6 2A 0D D1 6D 3E   2B FD 79 04 F4 F1 2B 0D  ...*..m>+.y...+.
#             0010: 5E C5 78 06 C6 AD A1 CB   2B 88 C6 F9 45 14 60 21  ^.x.....+...E.`!
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.862 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0E 88 DE 94 7F 4D 62 8C EF 5C CD 27 F3 AC 91 57 DC A7 C8 41 3C 8F 4F F7 62 4D B0 C0 CE 66 35 D5",
#   "session id"          : "74 44 7B 69 75 E5 6A 5B 89 96 A8 3F F8 4B D6 36 34 CE 7B 5B C9 DF 34 1D 34 1C 0E C8 C4 8B D9 F0",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A9 84 8B A9 35 41 0E 70   B8 B1 87 F9 CE 8D E9 66  ....5A.p.......f
#           0010: 37 E5 13 8B 2C A8 F0 25   3D 6A F7 74 70 CD 32 1A  7...,..%=j.tp.2.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.862 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.868 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.868 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.869 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.870 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.870 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.871 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.872 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.873 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.887 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.892 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.895 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.903 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.904 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.904 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.905 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.906 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.906 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:08.906 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.910 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 F8 FE 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:49.000 UTC",
#       "not  after"         : "2024-01-25 12:58:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 B2 16 B5 CD 1C 9A 0E   E8 D8 82 18 E2 18 D8 C8  ................
#           0010: 3C A2 3F 85                                        <.?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:08.910 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.001 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.010 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 72 17 8A 94 5C F5 A8 E6   84 E1 D3 70 A0 0E D4 FC  r...\......p....
#     0010: 2D 3F 93 A7 53 9C 56 44   2D C2 D6 A3 27 4D BF AF  -?..S.VD-...'M..
#     0020: 40 9A 6E DC A3 89 AF 97   F1 3C 8D D6 DA BB 03 08  @.n......<......
#     0030: F1 6D 52 1C 42 1A 95 9C   F2 C0 34 6E 81 C8 E3 A4  .mR.B.....4n....
#     0040: 61 D7 AF F7 25 5A C7 E0   B2 3B 4B E4 EB 50 24 54  a...%Z...;K..P$T
#     0050: B0 13 6D 46 CA 46 80 AE   56 D7 52 86 80 AD D1 4D  ..mF.F..V.R....M
#     0060: 0A 19 72 B1 56 5F 96 44   7A DD E5 3F 29 BF B7 5A  ..r.V_.Dz..?)..Z
#     0070: B8 7C 5D 0C 79 1C 3B 19   47 3C AF 4C E5 F7 67 1D  ..].y.;.G<.L..g.
#     0080: 5A E1 C4 C4 FD D5 29 16   2C 52 99 CF 2E 82 FD 9D  Z.....).,R......
#     0090: CB 60 67 17 87 44 31 09   23 D7 71 88 4B 68 6B 25  .`g..D1.#.q.Khk%
#     00A0: DB A8 1B 08 72 FF 25 0D   8F 7C 02 26 83 4B 37 37  ....r.%....&.K77
#     00B0: 2B F7 D7 BF 76 1B 46 A9   B2 99 AB 24 E9 8F 1B 95  +...v.F....$....
#     00C0: 7E 90 5C EB 3E FD 3C 09   2F 48 46 8F 4F CE 41 2F  ..\.>.<./HF.O.A/
#     00D0: 8A 7B 4E C5 23 59 58 16   DC 58 22 B0 81 16 AA 1F  ..N.#YX..X".....
#     00E0: C0 0A 0C 64 08 D2 5A EA   32 B0 E8 E7 54 53 E6 4D  ...d..Z.2...TS.M
#     00F0: 6F 89 D8 6F 3E 9F 0E B8   54 F1 AA B2 65 49 E3 56  o..o>...T...eI.V
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.012 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 63 97 4F EF D4 B0 FC 2D   6C 2F E8 44 A0 FC 36 C5  c.O....-l/.D..6.
#     0010: 75 57 87 A2 54 29 DA C4   CF F2 55 00 E6 09 B5 80  uW..T)....U.....
#     0020: 07 24 C2 A9 36 4D D0 E3   35 12 76 DD 01 24 FD A9  .$..6M..5.v..$..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.016 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:09.017 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:09.018 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.018 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.021 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4F 16 8A BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:52.000 UTC",
#       "not  after"         : "2024-01-25 12:58:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#           0010: FC F6 4D 89                                        ..M.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B D1 E8 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:46.000 UTC",
#       "not  after"         : "2024-01-25 12:58:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.066 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6C 1C E3 46 6B E6 85 30   C6 C3 25 E2 26 57 0E 3D  l..Fk..0..%.&W.=
#     0010: E6 24 EE AB D8 B6 31 E2   2F 7B 9A AE 00 FE 21 E9  .$....1./.....!.
#     0020: CE 4F 12 02 AC 7C 9C F7   95 51 F7 49 34 E7 4C F0  .O.......Q.I4.L.
#     0030: 8D 65 35 08 E3 55 FC 65   DD D2 2A C8 BB 80 E7 96  .e5..U.e..*.....
#     0040: A7 EC 61 23 FC 18 74 EF   74 68 77 83 AB D0 48 05  ..a#..t.thw...H.
#     0050: 9B 23 4D C3 6E A2 D2 30   C4 F9 62 8A 30 15 F6 7F  .#M.n..0..b.0...
#     0060: 04 CE 61 31 39 5B 35 47   9C A3 57 D0 BA EE FA 66  ..a19[5G..W....f
#     0070: BF 5E 76 F9 85 5C 94 20   34 60 42 D8 CF 70 D0 C0  .^v..\. 4`B..p..
#     0080: 23 EF DA B8 99 E1 29 E7   46 3B F3 75 DC 87 E4 21  #.....).F;.u...!
#     0090: FB DC 05 22 31 05 4F 4D   35 2D 6A B3 73 B9 F6 60  ..."1.OM5-j.s..`
#     00A0: CA 24 04 55 B4 FC FF F2   F2 70 BF EE 37 D1 F4 AE  .$.U.....p..7...
#     00B0: D1 93 AC 20 44 F3 14 07   F4 D2 EB 48 A4 15 AF 6C  ... D......H...l
#     00C0: 0F 27 2C DE 34 16 1D CA   DE F4 6A 10 C6 A5 3E 67  .',.4.....j...>g
#     00D0: 41 80 A5 7F E6 3B B1 B7   AA 37 01 53 F8 C2 8F AD  A....;...7.S....
#     00E0: 2A C7 9B 23 D6 FA FD 2A   E4 BC 82 4C D4 19 11 86  *..#...*...L....
#     00F0: EC 24 DD A4 94 A4 71 01   C9 6A 95 96 FF FF 80 F5  .$....q..j......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.067 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F2 23 9B EE A3 62 D8 76   E3 F6 B1 95 6F 16 06 80  .#...b.v....o...
#     0010: 68 25 60 F7 03 51 28 8C   B4 1E 8C E5 BD 0F 96 BF  h%`..Q(.........
#     0020: D4 29 0B FD 28 99 59 47   80 5E 2D D0 37 50 A7 9A  .)..(.YG.^-.7P..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.071 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:09.154 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "7E E9 17 7F B5 6F 7F 69 30 74 E6 4C 03 2E 00 AF 8E 99 EA 16 C3 C7 A5 12 C9 63 96 DA 45 E7 FF F2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 12:59:09.863 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 12:59:09.863 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 12:59:10.746; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 12:59:10.749; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 12:59:11.060; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:11.062; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 12:59:11.063; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-lxoFfn/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:11.095 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4F 16 8A BF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:52.000 UTC",
#     "not  after"         : "2024-01-25 12:58:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#         0010: FC F6 4D 89                                        ..M.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:11.098 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B F2 AD F3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:44.000 UTC",
#     "not  after"         : "2024-01-25 12:58:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:11.109 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:11.259 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.260 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:11.261 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:11.261 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.424 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.434 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.434 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.434 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:11.436 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "E3 A7 B5 A4 1C 92 5D 8C C3 0E ED 53 24 1D AB D1 A2 8A 89 3D 39 33 A3 23 13 70 84 86 06 89 34 6B",
#   "session id"          : "65 D3 A7 57 14 64 7F 56 39 00 7A B3 ED 00 42 33 4F CA 90 01 35 D6 9D 39 56 26 95 3E F6 37 1B 81",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2A 16 B8 5F 28 D6 B8 3B   C3 DC D0 7E 8C 82 96 A6  *.._(..;........
#             0010: 1E EA 1D 44 0D 0F 7A B3   39 1A 33 D3 E3 24 D7 14  ...D..z.9.3..$..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.524 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "08 C4 0F 6F CD 40 1A 85 C5 7A 05 AB 9A 38 76 97 60 92 D5 0B 69 D1 1F 5C 8C 95 54 80 C7 FA F9 C7",
#   "session id"          : "65 D3 A7 57 14 64 7F 56 39 00 7A B3 ED 00 42 33 4F CA 90 01 35 D6 9D 39 56 26 95 3E F6 37 1B 81",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: EA A1 09 C1 D9 77 C2 86   1F 38 B9 C4 5B 50 FF 3F  .....w...8..[P.?
#           0010: 40 9D A5 11 B2 E1 B2 6C   CA 76 3A E9 D3 F6 DA 6D  @......l.v:....m
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.524 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.524 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.527 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.532 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.532 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.532 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.533 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.548 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.551 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.561 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.564 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.566 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.567 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.568 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.568 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.570 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 F8 FE 17",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:49.000 UTC",
#       "not  after"         : "2024-01-25 12:58:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 B2 16 B5 CD 1C 9A 0E   E8 D8 82 18 E2 18 D8 C8  ................
#           0010: 3C A2 3F 85                                        <.?.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.570 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.619 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B D1 E8 9F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 12:58:46.000 UTC",
#     "not  after"         : "2024-01-25 12:58:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#         0010: 49 B3 73 D3                                        I.s.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#         0010: D4 A0 45 49                                        ..EI
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.621 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5E EE 6E DF 90 3D 3E 99   C6 71 4C 5C 09 71 30 E2  ^.n..=>..qL\.q0.
#     0010: D7 08 B6 45 B2 11 60 39   C0 B8 D3 05 04 2D 87 D2  ...E..`9.....-..
#     0020: 33 E8 F2 A2 2D 58 CB 81   CD 31 44 B5 83 59 CB 4E  3...-X...1D..Y.N
#     0030: BF E4 09 17 79 09 0A 63   CB 21 F0 5C 9F FC 96 01  ....y..c.!.\....
#     0040: D4 77 91 05 80 46 53 1E   B3 0A D6 98 B1 4F FD 63  .w...FS......O.c
#     0050: 91 36 84 EE 1B 08 A5 68   AA 2B 8F 91 B7 D9 8E E8  .6.....h.+......
#     0060: 50 7D 61 FF 94 35 4F 94   8E 55 B9 F6 A2 09 D2 8A  P.a..5O..U......
#     0070: E8 D9 30 F9 97 10 4A 32   9E E4 7B F1 1B 29 A1 9A  ..0...J2.....)..
#     0080: 58 90 3B BA CA 4A DE F3   4D 00 47 8F 54 B0 D7 9E  X.;..J..M.G.T...
#     0090: 83 FB C7 A3 19 6A 55 17   6C 57 2F 86 95 B6 E1 AA  .....jU.lW/.....
#     00A0: 5B 30 D5 DE F1 5D 0B 70   1E D1 0E 72 EA 40 0E 00  [0...].p...r.@..
#     00B0: 9B 69 DE 01 0D 7A 16 42   12 2A C3 D7 AF A6 A4 79  .i...z.B.*.....y
#     00C0: 4A 12 CC B1 37 79 06 14   9C F2 71 A5 4B 17 8E B1  J...7y....q.K...
#     00D0: 12 66 BB 45 29 92 AB 51   C2 28 79 80 7A D6 D9 25  .f.E)..Q.(y.z..%
#     00E0: BC D8 FC A7 0D C7 B6 4B   0E A2 17 4B AF B5 1B B2  .......K...K....
#     00F0: 8E AD 5D F4 5C 24 0F 9F   37 75 9F 67 49 1C BA BE  ..].\$..7u.gI...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.623 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F1 A4 33 25 51 7D D0 F3   D6 0C A0 C3 71 42 60 2D  ..3%Q.......qB`-
#     0010: 6F B0 31 02 C6 F8 85 CD   14 86 99 AD CD 9C A2 7C  o.1.............
#     0020: 49 44 23 C5 8D BD EC DD   D2 EF B6 96 DD BD 46 3C  ID#...........F<
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.625 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 12:59:11.626 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:11.627 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.627 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.629 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4F 16 8A BF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:52.000 UTC",
#       "not  after"         : "2024-01-25 12:58:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 94 70 90 97 BA 0A 01 A7   81 7C C9 C6 C8 CE 6B FC  .p............k.
#           0010: FC F6 4D 89                                        ..M.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B D1 E8 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:46.000 UTC",
#       "not  after"         : "2024-01-25 12:58:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.652 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 C6 5F C6 8C FA BA 40   CB 0F 54 47 84 10 67 5E  .._....@..TG..g^
#     0010: 5F 95 A0 B1 6D EB 5C 26   4F 1B A7 16 0D 80 1C C9  _...m.\&O.......
#     0020: 0B A8 8E BB F5 92 AE DC   88 1C 85 28 8A 7F C2 6F  ...........(...o
#     0030: D6 69 78 4A ED 11 E1 89   98 53 8A C0 3E C6 5B 42  .ixJ.....S..>.[B
#     0040: 3D 1C 43 FB B3 08 76 27   FB DB A9 15 8B 37 B3 47  =.C...v'.....7.G
#     0050: 81 26 30 E2 F3 46 74 83   2B 55 0E 45 7B E3 EF 23  .&0..Ft.+U.E...#
#     0060: 5B 0A E0 A5 13 9E 31 24   57 F7 20 06 1C 9A 03 3B  [.....1$W. ....;
#     0070: 66 29 C3 55 E7 5F 9D EE   D7 11 4A 6C 43 E8 CE C2  f).U._....JlC...
#     0080: 7A 90 37 DD CD 46 E0 2C   4E 79 C2 EE A5 70 C5 6F  z.7..F.,Ny...p.o
#     0090: 5D 3C B6 EC 7B 88 5E C1   34 5A C0 BC DD 20 F2 BF  ]<....^.4Z... ..
#     00A0: 3F 13 52 60 05 63 A5 53   C5 E0 CF F6 7C 5B 6C D5  ?.R`.c.S.....[l.
#     00B0: D2 48 1D E4 9C B5 CF F8   F0 8C E4 B0 76 A2 11 49  .H..........v..I
#     00C0: 5D 15 0B EA F6 E6 D6 E0   30 EE A3 01 66 7A 29 BE  ].......0...fz).
#     00D0: A3 F5 26 62 73 12 E6 C1   AB 8B BE 98 66 41 75 D8  ..&bs.......fAu.
#     00E0: 4D 5C 54 94 5A 93 95 82   93 02 03 A3 CF 24 48 D0  M\T.Z........$H.
#     00F0: BF 98 CE BF B0 B3 96 38   32 82 D6 35 6C DB 4A 12  .......82..5l.J.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.653 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F1 36 AB 05 BF E5 BA 30   FF FD 14 4B 17 02 A8 66  .6.....0...K...f
#     0010: EA 14 42 C5 EA 0D 51 A4   2E DC 9B 46 F7 CA C1 FB  ..B...Q....F....
#     0020: AC B9 5F DB 8B E8 C9 E7   64 1A DB A7 4B CB 6E 99  .._.....d...K.n.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.653 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:11.715 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "3A BD E2 8E BE 63 37 45 E3 36 06 98 7C 45 94 83 68 1C 76 E6 E1 2D 4E AF 46 A1 B5 43 B5 B7 A2 CE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 12:59:12.250 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 12:59:12.251 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.280 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.280 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.280 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 12:59:12.281 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 12:59:24.979; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:25.409 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B D1 E8 9F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:46.000 UTC",
#       "not  after"         : "2024-01-25 12:58:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2D 66 A5 E5 D6 73 32 FF   40 57 DB DD 2C 01 4C 5B  -f...s2.@W..,.L[
#           0010: D4 A0 45 49                                        ..EI
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B F2 AD F3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 12:58:44.000 UTC",
#       "not  after"         : "2024-01-25 12:58:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 69 64 37 D3 13 85 FE A9   45 A1 55 6F EC 5E D6 ED  id7.....E.Uo.^..
#           0010: 49 B3 73 D3                                        I.s.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 12:59:25.421 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:25.700 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.700 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:25.701 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 12:59:25.702 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.705 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.714 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.714 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.715 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 12:59:25.716 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "6E E7 24 5A E4 6B B1 0A 82 CD 80 9C 1F 12 6E 8A 65 4E CB 7E 17 02 9C 47 82 BB 7A 57 A7 26 46 CA",
#     "session id"          : "26 9D DA BA B6 77 A1 AB C3 3E D3 51 6F 9E 17 36 42 7F 30 A4 98 5D 57 21 4F 25 A6 AA 55 AE 77 AC",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 09 9D E7 29 0D 3D B6 26   3A 7F 02 CF 87 C7 92 90  ...).=.&:.......
#               0010: BB 56 67 90 2F C2 9A EC   45 69 6A A3 8B 7F 87 28  .Vg./...Eij....(
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.728 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "41 D4 A1 18 27 F8 CA 79 9E 7E 25 F4 7C EB 32 AB 6D 4B 6D F3 1E 2F B5 2E 7F 9F 30 C6 8B C5 00 8A",
#     "session id"          : "26 9D DA BA B6 77 A1 AB C3 3E D3 51 6F 9E 17 36 42 7F 30 A4 98 5D 57 21 4F 25 A6 AA 55 AE 77 AC",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA BF DF 9E F8 A3 E7 F7   18 65 8B 9E 29 4F 59 F2  .........e..)OY.
#             0010: F0 74 FE D5 41 80 E4 76   41 F1 F4 B4 99 68 31 24  .t..A..vA....h1$
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.729 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.730 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.731 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.731 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.731 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.732 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.733 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.733 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.739 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.740 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.741 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.743 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.743 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.743 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.744 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.745 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.745 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.745 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.746 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.746 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 12:59:25.747 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 12:59:25.747 UTC|SSLExtensions.java:215|Ignore impact of unsupported extensio

[...truncated too long message...]

ty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 13:00:43.523 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:37032/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14635ms
ok 78 stop command for single port in 17649ms
ok 79 status detects locally running solr in 8828ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7196ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 991ms
ok 82 listing out files in 2866ms
ok 83 copying files around in 6202ms
ok 84 upconfig in 2485ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1221ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1216ms
ok 87 Cleanup in 1988ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 44s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/er3lvrdtfmt7m

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8258 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8258/

All tests passed

Build Log:
[...truncated 1160 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40949/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 09:39:28.468; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 09:39:28.473; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:40949/solr] to [https://127.0.0.1:40949].
# WARN  - 2023-10-27 09:39:29.308; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 09:39:29.364; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17189ms
ok 74 start solr with client truststore and security manager in 19214ms
not ok 75 start solr with mTLS needed in 53721ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-oWgAsW/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40949 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40949 (pid=3436441). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40950 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40950 (pid=3436563). Happy searching!
#
#     INFO  - 2023-10-27 09:40:31.544; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 09:40:31.548; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 09:40:32.614; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:32.616; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:32.617; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:32.652 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 FF 2D BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:17.000 UTC",
#     "not  after"         : "2024-01-25 09:40:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#         0010: 6C 66 DB 91                                        lf..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:32.656 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 CD 5B E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:08.000 UTC",
#     "not  after"         : "2024-01-25 09:40:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:32.668 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:33.186 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.186 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:33.190 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:33.191 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.196 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.211 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.211 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.214 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:33.219 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BD F0 EC 04 B6 F6 C3 3C EB E8 26 77 E5 EC FD 6F 8B AA D4 C4 7E 55 F8 0C 5E 74 54 62 3D E3 DE 4D",
#   "session id"          : "5D 1E C0 E9 24 7F 71 23 B5 A4 03 0A 2F 73 16 DC A4 CC 25 E9 2F 2D 69 B1 49 03 42 38 8B 3D 27 E8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CC 2A A7 CE 9A 4E 10 DB   68 C5 28 16 6A CC 4E 05  .*...N..h.(.j.N.
#             0010: D8 AD C5 8F 3B 14 1C 5A   57 21 BA 4E B9 0C 9C 4F  ....;..ZW!.N...O
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.372 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4F 46 08 8C 62 55 33 16 A9 81 5A F0 63 FD ED 17 BE 86 92 07 01 59 0A 84 B1 95 EF E3 20 F6 A2 04",
#   "session id"          : "5D 1E C0 E9 24 7F 71 23 B5 A4 03 0A 2F 73 16 DC A4 CC 25 E9 2F 2D 69 B1 49 03 42 38 8B 3D 27 E8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 11 B0 31 3B 9A 43 86 21   1F 45 96 BD C2 58 25 CE  ..1;.C.!.E...X%.
#           0010: EC 72 4E 06 98 A8 C0 48   19 D5 2C 40 A0 82 88 1C  .rN....H..,@....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.372 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.372 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.374 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.379 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.402 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.404 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.405 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.419 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.420 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.421 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.422 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.423 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.424 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.424 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.436 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 C4 25 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:13.000 UTC",
#       "not  after"         : "2024-01-25 09:40:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 62 67 10 16 AE 5F 3A   E3 BC 9D D5 60 61 CE C4  .bg..._:....`a..
#           0010: AE EE 2F 08                                        ../.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.436 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.539 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.792 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D 8A 34 11 13 D5 82 91   DC 50 36 C2 62 3F 38 91  ..4......P6.b?8.
#     0010: E5 25 EE E5 F3 88 94 47   BA D4 87 A4 09 1E 3C 51  .%.....G......<Q
#     0020: 42 02 18 CB 7D B6 73 6D   42 A8 AC A5 11 E1 D1 28  B.....smB......(
#     0030: E6 83 90 1D 3A 8E C5 F0   20 40 B0 0A 9B 8E 55 00  ....:... @....U.
#     0040: ED 0E C3 D8 10 95 C6 4E   41 B4 86 4F 2D D8 27 B0  .......NA..O-.'.
#     0050: 8E 6C 9F EF 54 80 1E BD   78 E6 87 FE CB 1E CF 43  .l..T...x......C
#     0060: 79 4D 36 24 9A EB 11 F6   DC 45 8C 9D 80 CE 3C FF  yM6$.....E....<.
#     0070: 12 59 4B 3B AE 2B 46 F3   B2 D5 C3 D7 46 6A ED B5  .YK;.+F.....Fj..
#     0080: 4C 59 EC 65 17 D7 3E 95   31 F9 BE 2B 0D 5F 48 0B  LY.e..>.1..+._H.
#     0090: 42 70 25 09 A0 65 3C 8D   28 46 72 03 FA A2 68 53  Bp%..e<.(Fr...hS
#     00A0: 36 25 73 B2 8C EF 42 22   A9 ED 16 7E A8 C7 26 05  6%s...B"......&.
#     00B0: 6E 8E EF 08 8C 01 9C E1   77 B4 29 D4 68 9C 51 C1  n.......w.).h.Q.
#     00C0: B0 8F AA 07 B0 30 41 6F   A5 7B B8 9C B8 14 C8 C4  .....0Ao........
#     00D0: 3C 1D 9D 69 58 E6 F6 6A   43 E7 F0 A7 34 E8 57 0E  <..iX..jC...4.W.
#     00E0: 85 1A DD D7 34 17 C5 59   96 17 55 3D 18 E7 19 5D  ....4..Y..U=...]
#     00F0: FE 1A 22 78 76 A1 71 AE   2D F3 B9 02 4A 0B 6A 6F  .."xv.q.-...J.jo
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.794 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: AD 26 FA 71 AF 9D 54 BA   84 EB 50 19 0A 76 31 BB  .&.q..T...P..v1.
#     0010: AA 9E 63 43 C4 E2 8D 24   88 A2 25 4A 20 99 57 B6  ..cC...$..%J .W.
#     0020: 3F 1B 70 C4 AB EC 30 21   99 4D 92 99 56 62 F8 30  ?.p...0!.M..Vb.0
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.823 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:33.824 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.825 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.830 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 FF 2D BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:17.000 UTC",
#       "not  after"         : "2024-01-25 09:40:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#           0010: 6C 66 DB 91                                        lf..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 7C F6 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:10.000 UTC",
#       "not  after"         : "2024-01-25 09:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.901 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3C 85 A2 74 33 32 F4 26   86 71 B8 3E D9 EB 63 41  <..t32.&.q.>..cA
#     0010: 8B F2 5C 1B 54 88 74 84   E3 0F 6C D0 B2 53 2C B2  ..\.T.t...l..S,.
#     0020: 0A CA 6C 81 D7 EA 53 A2   0C DF E8 AC 5D 26 E2 08  ..l...S.....]&..
#     0030: F4 DC D9 51 08 EE C9 4A   87 48 31 02 B2 B1 C1 F1  ...Q...J.H1.....
#     0040: 19 D2 9E 19 6D AC A3 29   CB 81 F3 9B D4 BC FD 79  ....m..).......y
#     0050: E0 27 B4 02 97 F3 8E D5   30 C1 4E BA 18 A1 59 7A  .'......0.N...Yz
#     0060: 1F FD D8 5C F5 5C 6A 4C   04 C6 34 67 A9 0A 81 07  ...\.\jL..4g....
#     0070: CA F0 66 48 02 47 E9 10   21 D3 05 62 78 50 FC 75  ..fH.G..!..bxP.u
#     0080: 87 86 20 4A B2 E2 6F 21   50 A8 82 DE 75 86 06 55  .. J..o!P...u..U
#     0090: EE 4D 58 7B 23 C6 F3 0D   62 04 9D D5 05 62 6B B2  .MX.#...b....bk.
#     00A0: 3B 87 4A 07 4D FC A4 D8   43 3B D7 05 52 B5 8C 5D  ;.J.M...C;..R..]
#     00B0: 31 25 2E 29 B0 CD 0B 50   89 50 0F 80 ED B9 6B F3  1%.)...P.P....k.
#     00C0: 91 C7 6E 86 98 21 4F FB   C9 1E 0D 81 97 BA 14 01  ..n..!O.........
#     00D0: CA 81 6A 74 CE B8 BC 77   DF A1 6F 67 F0 BE 6D 38  ..jt...w..og..m8
#     00E0: B8 72 EC 57 CA EC 6F 08   F9 BB EB 81 99 B7 EA 33  .r.W..o........3
#     00F0: 3E 97 48 59 36 7E BF 4E   31 7E C6 A5 6A 9D C6 D1  >.HY6..N1...j...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.905 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F 4C 13 8E C0 66 44 4F   F9 D5 85 69 BE 83 05 97  OL...fDO...i....
#     0010: F4 14 78 7D 68 D9 41 70   A5 B8 D9 AA 59 28 50 B8  ..x.h.Ap....Y(P.
#     0020: 3D 23 38 81 0C B2 04 E2   27 7F F8 B2 58 21 06 26  =#8.....'...X!.&
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:33.909 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:34.005 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "51 5B 56 87 33 06 B5 9E AC 40 DA F7 A9 DB A2 74 9E 6D E7 35 D0 15 02 6B BD 66 8C 15 C7 0D C4 24",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:34.080 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-27 09:40:34.763 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 09:40:34.764 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-27 09:40:34.781 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-27 09:40:35.726; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 09:40:35.755; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 09:40:36.256; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:36.258; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 09:40:36.258; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-oWgAsW/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:36.294 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "18 FF 2D BE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:17.000 UTC",
#     "not  after"         : "2024-01-25 09:40:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#         0010: 6C 66 DB 91                                        lf..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:36.298 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 CD 5B E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:08.000 UTC",
#     "not  after"         : "2024-01-25 09:40:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:36.310 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:36.481 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.481 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:36.483 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:36.484 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.488 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.501 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.501 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:36.503 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F1 AC 03 5C 38 F3 A3 6A 0E BC 48 AA 9A 4E 4E FE 93 8D 8B F6 17 50 64 6B B9 66 0D DC EA C4 6A 27",
#   "session id"          : "4E AE D6 B4 E6 91 CA 04 67 0D 14 79 DA 05 F6 1F 80 06 D2 34 B1 50 37 B3 7D 70 B0 D2 2D D2 A6 5B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 2A 35 C0 E8 FB 48 DA 5B   D1 0B 8A 2C 86 89 DE 83  *5...H.[...,....
#             0010: 0E 43 F7 8F 6A 80 B8 BF   E6 2C B0 48 C0 54 1B 67  .C..j....,.H.T.g
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.647 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A7 35 99 21 F8 EE 88 68 7F 88 97 15 B0 9A 40 34 13 DA AB 92 D3 0B 63 F5 2C C8 32 F2 31 B3 61 78",
#   "session id"          : "4E AE D6 B4 E6 91 CA 04 67 0D 14 79 DA 05 F6 1F 80 06 D2 34 B1 50 37 B3 7D 70 B0 D2 2D D2 A6 5B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 98 3D 26 A4 B9 72 25 CF   80 7F 6B AA 12 6E 4B 30  .=&..r%...k..nK0
#           0010: F0 A4 37 75 18 ED 03 2B   54 99 2C E9 E4 78 B6 70  ..7u...+T.,..x.p
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.647 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.647 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.649 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.650 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.651 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.651 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.652 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.653 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.680 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.681 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.682 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.685 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.686 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.687 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.688 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.688 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.688 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.689 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.689 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.689 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.698 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 C4 25 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:13.000 UTC",
#       "not  after"         : "2024-01-25 09:40:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD 62 67 10 16 AE 5F 3A   E3 BC 9D D5 60 61 CE C4  .bg..._:....`a..
#           0010: AE EE 2F 08                                        ../.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.698 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.759 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "70 7C F6 A2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 09:40:10.000 UTC",
#     "not  after"         : "2024-01-25 09:40:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#         0010: 9E 15 19 06                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#         0010: F2 05 13 0F                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.762 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E B0 0F EE 1B E2 12 01   47 5C 6A 2D 7B 8B D9 44  n.......G\j-...D
#     0010: F0 1F C5 BA 94 79 82 F3   59 0A 3D 9E 16 BE C2 C9  .....y..Y.=.....
#     0020: 6C 3A 5B 0A 72 EB 1B E1   75 72 3F 9C 69 CE CC 86  l:[.r...ur?.i...
#     0030: 61 F4 87 B8 DB E7 91 9E   6B 8B 65 B2 82 D2 75 DE  a.......k.e...u.
#     0040: 0F 33 EC 8F 96 17 CA C1   B6 F6 7C 73 71 BF 58 35  .3.........sq.X5
#     0050: C9 4D 0C 4D 8F D6 4F F8   91 D9 A7 85 6E CC E9 2D  .M.M..O.....n..-
#     0060: DA 25 9F 2D 2A 94 1B C3   94 DF 88 06 40 BF 2E 22  .%.-*.......@.."
#     0070: AB 05 25 93 86 1C 69 A1   72 42 7E 98 67 11 3C C9  ..%...i.rB..g.<.
#     0080: 64 8E F4 DF 66 E1 2E D0   D0 48 29 5A FF CD 10 57  d...f....H)Z...W
#     0090: 71 F6 19 7B 73 59 1F 68   50 D7 21 CA B9 A8 80 DD  q...sY.hP.!.....
#     00A0: E3 CE B0 29 D2 36 7D F3   98 79 B8 C5 02 81 42 26  ...).6...y....B&
#     00B0: D6 82 91 7C C9 40 B6 95   85 D0 EF 39 EF 75 56 75  .....@.....9.uVu
#     00C0: C8 7E A7 B5 53 66 EE 04   15 71 94 BE 72 F7 22 ED  ....Sf...q..r.".
#     00D0: AD F6 0F 85 AC E6 6C 98   6A 79 92 86 41 DB ED 20  ......l.jy..A..
#     00E0: A2 1A EE 5B 2A 55 50 FF   43 BA A8 DD 09 89 F7 B4  ...[*UP.C.......
#     00F0: 74 DE 21 90 1A 3A 48 CF   70 49 0B 2D 6A 49 79 86  t.!..:H.pI.-jIy.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.764 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A2 33 6E 67 33 B4 2B 5D   0A F7 7B 47 89 CF F6 46  .3ng3.+]...G...F
#     0010: 7F 40 30 70 AE 12 6F 47   94 B7 A3 23 54 93 1A 1D  .@0p..oG...#T...
#     0020: 6E 2E 78 7E 15 59 BA 50   34 61 59 B3 7E 27 07 BB  n.x..Y.P4aY..'..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.765 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:36.766 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:36.767 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.768 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.769 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "18 FF 2D BE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:17.000 UTC",
#       "not  after"         : "2024-01-25 09:40:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 E7 7E 00 41 56 73 55   83 5B 88 40 D8 05 75 09  ....AVsU.[.@..u.
#           0010: 6C 66 DB 91                                        lf..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 7C F6 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:10.000 UTC",
#       "not  after"         : "2024-01-25 09:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.794 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C2 0F 7D 4A 3B 5D 7C 46   38 39 FF D6 40 67 F0 96  ...J;].F89..@g..
#     0010: 48 9D 72 1A 01 77 A7 F9   B4 03 E6 6F 44 CF B3 01  H.r..w.....oD...
#     0020: A3 B3 1D DD EB 11 59 EB   DC 0A A0 56 62 63 9A 1B  ......Y....Vbc..
#     0030: 00 52 74 C2 94 D3 CA 43   46 67 7B 83 17 03 2A D2  .Rt....CFg....*.
#     0040: 89 37 AD 99 D5 E7 25 23   B4 1D CF 6C 4B A3 C8 5D  .7....%#...lK..]
#     0050: DC 78 B2 0A B1 CC EC 30   EF 37 33 1B 84 1D BD 18  .x.....0.73.....
#     0060: 08 E9 6B 28 24 65 86 B7   41 D2 63 92 91 10 E2 B0  ..k($e..A.c.....
#     0070: AC 24 AD 62 F1 55 FA 3F   7A 84 DC 54 CE D6 C8 69  .$.b.U.?z..T...i
#     0080: D6 BE 44 3A FC 5A 72 48   FE D1 0A 77 44 C4 9D 5D  ..D:.ZrH...wD..]
#     0090: 8F A7 87 F0 9A 46 D6 85   51 C6 5C 8D A7 C8 33 32  .....F..Q.\...32
#     00A0: BC EF CC CF 8E 65 1E C1   EE 2E 90 D2 E2 C0 C3 92  .....e..........
#     00B0: F3 C5 08 38 3A 40 C8 EB   7B C2 9E 6D 14 72 25 2A  ...8:@.....m.r%*
#     00C0: 72 B3 03 50 01 F5 A2 05   33 36 A3 55 C4 69 4C D8  r..P....36.U.iL.
#     00D0: 87 38 62 B0 57 5E 1D CD   87 62 A4 42 B7 FD 60 40  .8b.W^...b.B..`@
#     00E0: 15 B6 B2 EE 24 67 97 36   FE A0 96 E5 85 96 9B A6  ....$g.6........
#     00F0: 6F F1 11 6D 90 3D 3D B0   75 96 21 80 BF 74 BF 30  o..m.==.u.!..t.0
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.795 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F7 D1 39 CC 3D A2 A6 64   5D A1 6A B3 56 2C 1D B8  ..9.=..d].j.V,..
#     0010: C2 5A 8F 83 1D 22 D0 2F   06 5A F4 79 E8 75 5B DE  .Z..."./.Z.y.u[.
#     0020: F3 ED FE A6 84 8F 90 19   C6 BF E9 35 40 0E B3 24  ...........5@..$
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.796 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:36.996 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "19 91 C4 CF 5A 9D 40 E7 86 42 11 20 FC B7 A8 2F D9 DA 30 39 5B 00 1B A3 EB 12 3C 04 0C 31 1A F7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.277 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.278 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.278 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 09:40:37.278 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-27 09:40:37.325 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 09:40:37.326 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 09:40:37.326 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-27 09:40:50.495; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:50.812 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 CD 5B E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:08.000 UTC",
#       "not  after"         : "2024-01-25 09:40:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "70 7C F6 A2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 09:40:10.000 UTC",
#       "not  after"         : "2024-01-25 09:40:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 65 EF FA 5E 1D F1 80 35   0D 5D FE 6F 43 70 F7 FA  e..^...5.].oCp..
#           0010: 9E 15 19 06                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 17 E3 5A 79 A5 96 3F CF   1F 4B 37 87 C0 DB C3 96  ..Zy..?..K7.....
#           0010: F2 05 13 0F                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 09:40:50.825 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:51.105 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.106 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:51.107 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 09:40:51.107 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.112 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.123 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.123 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.123 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 09:40:51.125 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "73 63 1D 17 A9 27 A1 C5 17 97 41 0E 47 69 E9 D9 FA 9A C0 97 CC 26 0D B6 46 E3 D4 AE B2 A3 0D AD",
#     "session id"          : "CE D1 FD 3A 3A FD B0 D2 A1 0D 86 16 66 5A 9E 8B 43 4D F5 98 15 79 E6 41 0F AE 65 FE 58 D7 A4 FD",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 68 CB 19 1A 52 A9 7A F0   E3 10 50 77 E3 E4 7C 59  h...R.z...Pw...Y
#               0010: E1 FF 3D 9B A9 00 16 54   11 FB 6A 38 0E 9C 1F 24  ..=....T..j8...$
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.148 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "ED 0F 00 E8 4E 39 8C A2 73 2B D6 46 53 34 B4 02 91 88 DD 6A B4 32 8A AE 76 C7 E6 A7 D1 E6 87 C3",
#     "session id"          : "CE D1 FD 3A 3A FD B0 D2 A1 0D 86 16 66 5A 9E 8B 43 4D F5 98 15 79 E6 41 0F AE 65 FE 58 D7 A4 FD",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 70 3A 62 10 8B 69 36 26   39 C8 3D 2F 76 5B BB 03  p:b..i6&9.=/v[..
#             0010: 0F 22 85 F7 5D A9 6D C0   E5 58 C1 7C 44 30 A1 34  ."..].m..X..D0.4
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.148 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.148 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.150 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.151 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.153 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.154 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.166 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.167 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.168 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.174 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.179 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.180 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:40:51.180 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 09:40:51.181 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-

[...truncated too long message...]

jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 09:42:06.562 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:40950/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 15077ms
ok 78 stop command for single port in 17850ms
ok 79 status detects locally running solr in 9424ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7443ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1087ms
ok 82 listing out files in 2941ms
ok 83 copying files around in 6571ms
ok 84 upconfig in 2780ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1240ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1238ms
ok 87 Cleanup in 2046ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/eb2ykhxjjvic6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8257 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8257/

All tests passed

Build Log:
[...truncated 1161 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35553/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 07:12:27.227; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 07:12:27.232; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35553/solr] to [https://127.0.0.1:35553].
# WARN  - 2023-10-27 07:12:28.049; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 07:12:28.087; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17325ms
ok 74 start solr with client truststore and security manager in 19342ms
not ok 75 start solr with mTLS needed in 54773ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-D1FDga/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35553 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35553 (pid=3139783). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35554 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35554 (pid=3139910). Happy searching!
#
#     INFO  - 2023-10-27 07:13:30.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 07:13:30.837; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 07:13:32.181; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:32.183; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3d08f3f5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:32.185; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(ca,h=[localhost],a=[],w=[]) for Client@89c10b7[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:32.234 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 18 DA DC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:16.000 UTC",
#     "not  after"         : "2024-01-25 07:13:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#         0010: 07 D7 E9 59                                        ...Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:32.238 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 77 68 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:07.000 UTC",
#     "not  after"         : "2024-01-25 07:13:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:32.250 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:32.893 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.893 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:32.897 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:32.897 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.906 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.927 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.928 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.928 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:32.932 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C1 65 4E 01 79 DB 4A B5 5D 56 7F B8 00 FA C9 70 A4 55 BC 58 39 EA 0E 58 08 42 50 E9 2C 6A 44 2A",
#   "session id"          : "6E 3D 4D DF B7 DB DD DB 0F E1 EB 45 61 92 46 BE B8 D3 02 AD 22 00 BA 21 ED 90 91 AC 79 77 77 95",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 90 A0 5E 68 34 00 E1 29   96 81 01 8A 3E 1B C4 39  ..^h4..)....>..9
#             0010: AD 1E CF 1E A9 7A F7 04   17 58 D0 43 99 34 63 33  .....z...X.C.4c3
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.103 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B0 A2 62 FF B8 A9 C8 D0 72 AC E7 AA CF 77 20 49 70 55 CA 1C 80 9B BC A4 52 30 7A 7D 85 37 F7 73",
#   "session id"          : "6E 3D 4D DF B7 DB DD DB 0F E1 EB 45 61 92 46 BE B8 D3 02 AD 22 00 BA 21 ED 90 91 AC 79 77 77 95",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D5 9D 0E 8E A3 9A AC 10   60 9C 87 2F 5A B8 A7 17  ........`../Z...
#           0010: DE 40 9B 58 B1 35 3F 76   18 86 54 96 FE EE EC 76  .@.X.5?v..T....v
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.103 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.104 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.104 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.105 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.107 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.108 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.124 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.152 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.154 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.167 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.176 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.177 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.178 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.178 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.178 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.179 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.203 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.204 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.204 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.208 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 D0 60 BA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:12.000 UTC",
#       "not  after"         : "2024-01-25 07:13:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 DC 1C E0 C4 16 03 09   41 BD 80 A1 B4 C8 14 FD  ........A.......
#           0010: DB 55 09 91                                        .U..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.208 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.310 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.317 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 22 F8 0C 00 94 9B C7 26   A8 AC C6 D8 CA E8 20 9B  "......&...... .
#     0010: 76 46 E5 AB D7 DA 49 98   ED 99 3F 6E 4D 0E A2 F3  vF....I...?nM...
#     0020: 9F C9 35 CA 83 D5 17 61   D9 46 D8 9A 14 A9 C5 F5  ..5....a.F......
#     0030: 9A C1 93 4F 54 0C 2F 63   1D 92 F4 AD 64 9D FA 84  ...OT./c....d...
#     0040: 9B 59 63 03 C1 0D EF 25   B3 E0 BB 64 E3 76 52 DA  .Yc....%...d.vR.
#     0050: BD C9 97 EA 90 67 1E 37   52 0A AE EA 92 32 DF 89  .....g.7R....2..
#     0060: 88 2C 6B 45 CC 85 E8 CE   52 D9 9C 20 BE 39 B3 39  .,kE....R.. .9.9
#     0070: 12 1D 80 76 42 B6 72 DB   4C 54 B0 E9 B4 A0 32 07  ...vB.r.LT....2.
#     0080: 83 1F 39 04 16 20 CD B8   C4 E2 03 EC 49 31 6A BF  ..9.. ......I1j.
#     0090: A2 84 60 C6 54 54 FB FB   72 44 50 6A EA 3A 2D FC  ..`.TT..rDPj.:-.
#     00A0: 29 93 B1 24 5A 16 0D 37   F8 4D 7B 1A 83 3D B2 52  )..$Z..7.M...=.R
#     00B0: 56 F7 EC 47 F4 C1 B6 87   FB 9D C3 AB 88 56 49 7C  V..G.........VI.
#     00C0: F4 99 C4 09 B1 E7 F6 3F   2E 89 C2 58 88 71 8E 04  .......?...X.q..
#     00D0: FA 52 EA 1B F5 CA 97 36   B8 0A B4 E7 49 7E 25 33  .R.....6....I.%3
#     00E0: 19 32 FF F7 FD A6 AF 33   4F 5C C3 07 FB 05 53 36  .2.....3O\....S6
#     00F0: 6B 2D C5 E2 AC 63 68 44   91 F7 0D 4F DD 27 D3 EC  k-...chD...O.'..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.318 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 10 ED 25 41 40 0C DA CD   B1 28 D5 75 A7 F2 DB D9  ..%A@....(.u....
#     0010: DF 2B 51 DF 0B 06 55 C0   12 B2 42 C2 38 FC 4D 42  .+Q...U...B.8.MB
#     0020: 9C C2 4B E1 31 D4 18 E6   E8 42 98 40 A1 78 A3 B4  ..K.1....B.@.x..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.327 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:33.336 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.336 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:33.336 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.337 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.341 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 18 DA DC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:16.000 UTC",
#       "not  after"         : "2024-01-25 07:13:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#           0010: 07 D7 E9 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 F4 39 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:09.000 UTC",
#       "not  after"         : "2024-01-25 07:13:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.392 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 48 D2 81 5F 2E F7 F2   45 D8 3F AF F4 E5 70 21  EH.._...E.?...p!
#     0010: 01 99 4D BC BF 46 27 DD   54 99 84 DB AD 72 1B 26  ..M..F'.T....r.&
#     0020: F2 DC 23 F8 63 FE 9C B6   B9 DD 5A 70 28 52 12 26  ..#.c.....Zp(R.&
#     0030: 2A CB B2 0E 14 C2 4A 01   B1 77 30 A1 A5 97 60 A9  *.....J..w0...`.
#     0040: 82 2A 9D 0A B9 D6 02 6D   7B 1C DD 56 99 2E BE D3  .*.....m...V....
#     0050: 21 06 28 93 E5 13 17 17   B2 F8 36 E3 D4 8E D9 B5  !.(.......6.....
#     0060: 70 BB E8 F8 E8 00 82 D6   B2 4B AC D2 8B F1 4E CC  p........K....N.
#     0070: B9 91 8B E7 FD F2 E6 BA   27 98 58 BC BA CF 7A A4  ........'.X...z.
#     0080: 94 B9 01 6F C6 B8 A1 9D   1E 3B D5 96 25 19 2D B7  ...o.....;..%.-.
#     0090: 73 B5 17 5B 0E 62 E2 56   8B 92 85 70 AB F5 79 FF  s..[.b.V...p..y.
#     00A0: DD 95 1E A6 1E 1D 9C 07   6A 80 B5 18 96 41 F6 FF  ........j....A..
#     00B0: FE 14 4B 50 F0 09 ED E7   3B C0 55 39 23 97 50 2C  ..KP....;.U9#.P,
#     00C0: EF E2 58 98 33 A9 E1 7C   97 D0 59 9A 8B A3 88 7D  ..X.3.....Y.....
#     00D0: 9D 4D A6 C3 EB 91 27 4E   0E 46 B6 34 1E 91 C1 11  .M....'N.F.4....
#     00E0: EB 07 EA 24 42 BA B2 E5   34 38 A2 01 AA 1D FC CF  ...$B...48......
#     00F0: F3 E7 E7 32 68 AC EC 27   41 64 28 F7 DA A4 E9 D7  ...2h..'Ad(.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.397 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 78 97 01 0D 12 EA 4C 87   FE D0 11 35 DC 47 1E F8  x.....L....5.G..
#     0010: 22 ED 72 EA 8E 23 BB BF   AB D3 A6 7E B3 EC C2 D3  ".r..#..........
#     0020: A5 EE B5 6E 59 96 84 A0   34 47 D9 7D D5 FC F3 44  ...nY...4G.....D
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.401 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:33.778 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1D 0B 62 5C 90 17 D1 F7 A1 69 65 06 48 F8 EC 76 EF 18 D6 52 83 E4 B6 F1 27 53 39 E3 E9 1A 7D 76",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:13:33.812 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-27 07:13:34.039 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 07:13:34.040 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 07:13:35.353; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 07:13:35.357; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 07:13:35.706; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:35.708; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 07:13:35.708; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-D1FDga/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:35.746 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1C 18 DA DC",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:16.000 UTC",
#     "not  after"         : "2024-01-25 07:13:16.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#         0010: 07 D7 E9 59                                        ...Y
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:35.750 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B 77 68 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:07.000 UTC",
#     "not  after"         : "2024-01-25 07:13:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:35.762 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:35.939 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.939 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:35.941 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:35.941 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.946 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.957 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.957 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.957 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:35.960 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "64 B9 28 F8 3A B1 3A 78 7D 14 7E 45 0F FC 82 F4 4A AA E7 D0 61 34 4F 15 3D 8F D0 D1 E3 99 4F FD",
#   "session id"          : "7A A8 BC 21 D7 2D 89 24 FB 96 AA 8E 2E F7 86 74 DD 2F 4F F2 30 28 05 EE AE 07 C8 A1 E8 44 87 F5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BA 7A 6F 89 00 7C 02 06   7F 47 61 4F C9 23 62 FB  .zo......GaO.#b.
#             0010: 9E 1E FB 4C 98 98 9C 13   C4 F0 D6 8E 7B 85 3B 3F  ...L..........;?
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.087 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "35 0F 69 AD 80 18 97 48 B7 9C AE 92 AC C0 17 B8 34 33 2F 61 C4 16 2A 6D BA 7B 6F F5 01 ED 05 FC",
#   "session id"          : "7A A8 BC 21 D7 2D 89 24 FB 96 AA 8E 2E F7 86 74 DD 2F 4F F2 30 28 05 EE AE 07 C8 A1 E8 44 87 F5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 1C 9E 3A CD F6 A6 35 2A   14 DA 4A C3 DB FC 04 82  ..:...5*..J.....
#           0010: 5B F6 3D B8 90 34 55 C2   1E 00 68 8E F8 34 96 39  [.=..4U...h..4.9
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.088 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.088 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.096 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.098 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.098 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.098 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.100 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.113 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.116 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.119 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.122 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.122 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.122 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.123 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.133 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.143 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.143 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.144 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.144 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.145 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.145 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.148 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "37 D0 60 BA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:12.000 UTC",
#       "not  after"         : "2024-01-25 07:13:12.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 87 DC 1C E0 C4 16 03 09   41 BD 80 A1 B4 C8 14 FD  ........A.......
#           0010: DB 55 09 91                                        .U..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.148 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.207 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 F4 39 5E",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 07:13:09.000 UTC",
#     "not  after"         : "2024-01-25 07:13:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#         0010: 32 23 56 6C                                        2#Vl
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#         0010: DF 37 B1 DD                                        .7..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.212 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: C0 B2 2F 62 9D A3 2B 7A   B1 2B 18 E5 A4 1A FA AA  ../b..+z.+......
#     0010: 50 03 ED 5E D0 5B CE 5A   4E B3 BC 75 3D EA A5 59  P..^.[.ZN..u=..Y
#     0020: F8 7D C6 53 BB AD 6E 0F   3E EA 5E 8B DA 9B 0E 5A  ...S..n.>.^....Z
#     0030: 3D DC 9B F4 31 05 64 96   E3 FB 35 BA 03 6A B4 5F  =...1.d...5..j._
#     0040: 38 A7 05 1C E3 67 C1 9D   91 4C 70 97 A8 49 75 CD  8....g...Lp..Iu.
#     0050: 99 E6 D9 D1 49 A1 FD BD   A4 61 3C 4C 5B A7 A9 D7  ....I....a<L[...
#     0060: 2F AB 1D 35 DD A3 90 52   F9 C5 C4 09 87 4B F4 4D  /..5...R.....K.M
#     0070: 79 53 33 2B 01 51 2F 7E   97 60 AD 76 34 A9 BC F8  yS3+.Q/..`.v4...
#     0080: 8D 51 07 6D 3E BA F2 DF   7E 0E 3B 1B 74 4E 6C 8F  .Q.m>.....;.tNl.
#     0090: 25 3E 70 84 A0 4C 1F CB   33 56 EA E9 B7 3E B5 A1  %>p..L..3V...>..
#     00A0: 0F 40 7F EF 9F 3E 67 D5   EC 75 40 4B AE 7B CD 4F  .@...>g..u@K...O
#     00B0: DE 92 8D 92 EA 1A 89 64   0D 16 85 CA A5 A5 EB BB  .......d........
#     00C0: 1B 6C 15 30 40 FE 39 08   7B F1 FF 18 59 B3 5D 12  .l.0@.9.....Y.].
#     00D0: 82 CF 00 FF D5 F8 D6 8E   E8 60 5B BC D8 9B 41 C1  .........`[...A.
#     00E0: D1 8D C4 C2 52 C0 A3 BB   24 67 3E 7F 99 74 BD F1  ....R...$g>..t..
#     00F0: 82 D0 F6 5D BC 31 D3 8E   8C E6 F0 93 52 CB 4C DD  ...].1......R.L.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.214 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7F 3B 7C AB F2 33 66 ED   61 A7 B1 55 CF BF CC 2F  .;...3f.a..U.../
#     0010: CF 9B 01 F9 5C 77 33 C3   E4 47 56 CC 35 28 6C 5F  ....\w3..GV.5(l_
#     0020: 49 0B E5 C7 84 D0 96 FB   65 06 E2 CA C0 BF FE 02  I.......e.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.215 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.216 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 07:13:36.217 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:36.217 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.217 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.219 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 18 DA DC",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:16.000 UTC",
#       "not  after"         : "2024-01-25 07:13:16.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 58 6F 17 37 F2 D3 E3 5C   2A C2 2A E9 0F 0E AD 9C  Xo.7...\*.*.....
#           0010: 07 D7 E9 59                                        ...Y
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 F4 39 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:09.000 UTC",
#       "not  after"         : "2024-01-25 07:13:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.242 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 09 F4 BF 62 28 18 89 5A   68 2A 4E AC 78 DD 4E FF  ...b(..Zh*N.x.N.
#     0010: 62 FD B8 DA 6D 1B 2F 0E   BB BD E5 73 64 F5 30 9F  b...m./....sd.0.
#     0020: 17 94 32 EF 63 9C 54 2B   F1 59 A8 5B D7 1A 27 2C  ..2.c.T+.Y.[..',
#     0030: 53 C2 F0 AE B4 66 1B B3   D5 AE 9A A5 4A A8 34 9A  S....f......J.4.
#     0040: 61 26 FE C5 88 AF C9 E7   AF 7C 3B F6 2C CB 2A 97  a&........;.,.*.
#     0050: FD CE 6B F7 AB EF 40 87   50 68 81 0B 4E EF 10 B5  ..k...@.Ph..N...
#     0060: 6A 28 F7 A4 4B D5 DF 1E   67 21 46 8C 9F DF E5 6E  j(..K...g!F....n
#     0070: C5 6A E9 31 EA 39 76 CF   EE E9 98 AD D7 6C 23 3B  .j.1.9v......l#;
#     0080: 97 D4 63 65 24 7B A6 D4   DB 69 2F D7 09 60 75 15  ..ce$....i/..`u.
#     0090: 3C 15 76 F2 27 2F 65 7D   5E 60 59 72 E1 E6 00 7C  <.v.'/e.^`Yr....
#     00A0: B1 6D 4C 7D 83 79 0D 5A   2C 96 2E 0B 59 02 1E 48  .mL..y.Z,...Y..H
#     00B0: 07 91 96 29 E4 B2 91 A0   F6 1A 1D 73 B0 18 44 B6  ...).......s..D.
#     00C0: 85 6B 1D DB 7A 0A 35 77   6B 37 5D 1C F8 B8 82 98  .k..z.5wk7].....
#     00D0: B9 71 B1 20 95 C7 1F C9   58 36 74 7F D5 A5 A6 DA  .q. ....X6t.....
#     00E0: A9 02 38 C3 E9 94 22 6E   B9 EA 79 28 7A 0D 3F 36  ..8..."n..y(z.?6
#     00F0: FE E2 5E 9D 91 7A A9 A6   39 A0 CE 22 06 7F A1 F8  ..^..z..9.."....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.243 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3C F3 DC DC 0C C8 63 F8   C1 96 01 B4 F1 7F 63 8D  <.....c.......c.
#     0010: C8 A3 C8 88 F4 49 92 14   3A 02 91 A1 50 91 BA 26  .....I..:...P..&
#     0020: E3 AF 14 8B 53 02 99 EE   0C F6 93 0A 30 B2 0F 53  ....S.......0..S
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.244 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:36.309 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FB 79 04 78 E2 0A 25 68 B1 C3 77 71 19 9A 6D 8B 5D 6F 39 18 32 D4 EF 31 F6 1C 23 B6 36 3E CA 30",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 07:13:36.624 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 07:13:36.625 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 07:13:49.805; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:50.297 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B 77 68 36",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:07.000 UTC",
#       "not  after"         : "2024-01-25 07:13:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 F4 39 5E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 07:13:09.000 UTC",
#       "not  after"         : "2024-01-25 07:13:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0D A2 D0 BC 38 44 E0 E7   BE 88 21 BF EA 17 2C 92  ....8D....!...,.
#           0010: 32 23 56 6C                                        2#Vl
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4F 72 9F 95 E5 36 3C E7   40 CC 31 4D DB 53 33 6E  Or...6<.@.1M.S3n
#           0010: DF 37 B1 DD                                        .7..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 07:13:50.310 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:50.480 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.481 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:50.482 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 07:13:50.482 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.487 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.498 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.498 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.498 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 07:13:50.500 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2E 62 A9 91 84 94 C9 AC E5 60 4D FD 0E 46 0A D3 77 5B 68 CD CE 72 BC B1 37 AD 85 30 17 F4 8A AD",
#     "session id"          : "03 D0 A4 FD 11 94 A4 5E A7 56 B3 12 4B CD 5E A6 64 5D E0 04 B4 A8 CC 1F 03 9E 37 9B E9 4E FA DE",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 10 BA C9 D0 60 A7 19 BD   7D 1D 8F 7C 98 33 38 6C  ....`........38l
#               0010: D5 81 B1 4C 82 83 10 BD   68 29 33 22 08 48 90 6B  ...L....h)3".H.k
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.524 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F6 D4 43 CE 69 7A 17 01 86 B4 8E 79 73 B4 20 0B 8D A6 E7 43 5B A9 D6 18 37 10 54 33 83 18 7B 81",
#     "session id"          : "03 D0 A4 FD 11 94 A4 5E A7 56 B3 12 4B CD 5E A6 64 5D E0 04 B4 A8 CC 1F 03 9E 37 9B E9 4E FA DE",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: F5 E9 1A 6E 34 AD 07 4C   DB 87 0A C7 39 91 D4 37  ...n4..L....9..7
#             0010: 2E A7 F4 2C F9 37 62 79   54 B2 FF B7 D9 81 06 25  ...,.7byT......%
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.525 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.525 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.527 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.530 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.530 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.530 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.531 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.535 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.536 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.544 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.546 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.549 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.552 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.553 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.555 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.557 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.557 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.557 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.559 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.561 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.562 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:13:50.562 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 07:13:50.566 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "certificate" : {
#         "version"            : "v3",
#         "serial number"      : "37 D0 60 BA",
#         "signature algorithm": "SHA256withRSA",
#         "issuer"             : "

[...truncated too long message...]

.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 07:15:06.329 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35554/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.414 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.415 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.415 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 07:15:06.415 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
ok 77 SOLR-11740 check 'solr stop' connection in 14455ms
ok 78 stop command for single port in 17825ms
ok 79 status detects locally running solr in 9429ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7676ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1104ms
ok 82 listing out files in 2958ms
ok 83 copying files around in 6747ms
ok 84 upconfig in 2923ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1247ms
ok 87 Cleanup in 2114ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 11s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/2rpkzlqjgkrn2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8256 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8256/

All tests passed

Build Log:
[...truncated 1163 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41999/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-27 03:14:07.145; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 03:14:07.150; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41999/solr] to [https://127.0.0.1:41999].
# WARN  - 2023-10-27 03:14:08.077; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-27 03:14:08.114; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16349ms
ok 74 start solr with client truststore and security manager in 19709ms
not ok 75 start solr with mTLS needed in 53997ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-UpWmEX/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41999 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41999 (pid=2622925). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 42000 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 42000 (pid=2623094). Happy searching!
#
#     INFO  - 2023-10-27 03:15:10.174; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 03:15:10.179; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 03:15:10.894; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:10.897; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:10.899; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:10.957 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 0C BC AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:56.000 UTC",
#     "not  after"         : "2024-01-25 03:14:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#         0010: 2B 0E 15 4D                                        +..M
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:10.961 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 61 A7 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:47.000 UTC",
#     "not  after"         : "2024-01-25 03:14:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:10.980 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:11.349 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.349 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:11.351 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:11.351 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.366 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.386 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.386 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.386 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:11.388 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "ED A7 CF A1 EF 36 CE 1A 27 D4 AA 78 33 E8 17 74 66 15 68 50 2B A3 C0 27 43 F9 7C 0A 15 86 F3 EC",
#   "session id"          : "7C 07 C8 97 A3 0C EA 01 2C BF C5 8E 6E B8 46 C1 55 23 F9 A9 8D B2 5F 02 48 ED 15 02 FD 75 41 5F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 37 9C 10 5F D0 A1 66 BD   EA E2 A9 08 2D 28 1F 08  7.._..f.....-(..
#             0010: 69 02 A1 C3 2B 34 13 E9   61 4F 2D 78 F4 9B D6 6E  i...+4..aO-x...n
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.971 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "08 90 A2 6B BB BB 2A 17 72 A8 B4 64 35 80 82 6A C5 07 84 D3 7C 71 A1 CC C5 1E DA 24 39 C2 B9 BE",
#   "session id"          : "7C 07 C8 97 A3 0C EA 01 2C BF C5 8E 6E B8 46 C1 55 23 F9 A9 8D B2 5F 02 48 ED 15 02 FD 75 41 5F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: AD B9 BE 47 54 7B A0 7D   42 FB 92 98 66 1D 36 97  ...GT...B...f.6.
#           0010: 20 CC 85 C3 3A 20 F9 20   BA C4 AE 7C AE 59 11 11   ...: . .....Y..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.971 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.971 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.972 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.973 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.975 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.976 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:11.977 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.005 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.007 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.009 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.020 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.022 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.022 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.023 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.023 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.023 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.024 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.024 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.026 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 9F 91 E7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:52.000 UTC",
#       "not  after"         : "2024-01-25 03:14:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 AB A4 B3 D3 51 D5 19   F9 89 EE 5D B8 B8 21 04  .....Q.....]..!.
#           0010: 1A 82 5A 26                                        ..Z&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.027 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.117 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.125 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 21 9D D3 6C 91 0F D1 61   EE 0D 3E 25 02 17 9F C1  !..l...a..>%....
#     0010: C5 1D 56 59 05 AB AF 43   CE 5C 4A D0 80 42 48 88  ..VY...C.\J..BH.
#     0020: EC 9D 88 D9 2D 6B CD EE   92 5E 7E 1C 5D 9B 5B D0  ....-k...^..].[.
#     0030: 17 04 15 2B 72 EC 34 D3   85 07 A8 BD 5D 69 42 65  ...+r.4.....]iBe
#     0040: 9F 35 5F 5D 5F 31 22 80   37 10 75 B5 F6 23 70 41  .5_]_1".7.u..#pA
#     0050: 82 74 5B C0 A2 93 0A B9   A8 8C 5B E1 D4 E2 50 30  .t[.......[...P0
#     0060: BD 5E 45 9B 93 F7 25 F6   21 B1 F0 E2 7E 26 23 C1  .^E...%.!....&#.
#     0070: D8 18 9D 30 92 E8 A3 79   A4 D2 51 FA C0 0F 34 6D  ...0...y..Q...4m
#     0080: 56 9A C0 46 5A 9B 69 1D   4B 50 E3 4E A3 44 FD 5C  V..FZ.i.KP.N.D.\
#     0090: 4C 93 E0 51 92 78 90 4B   02 21 F8 66 C5 7C CE 18  L..Q.x.K.!.f....
#     00A0: C6 59 3E 41 B7 2F 91 54   12 59 35 7F FD 11 FB 2D  .Y>A./.T.Y5....-
#     00B0: B7 76 F0 79 97 1C D3 88   9A 86 C5 7B 19 7C 18 A9  .v.y............
#     00C0: B2 07 71 99 98 74 59 ED   D2 30 72 90 26 02 6A BC  ..q..tY..0r.&.j.
#     00D0: 98 CE 50 BF A0 B8 82 47   20 D3 85 88 B3 E9 ED 0F  ..P....G .......
#     00E0: 2D 31 BB CE 97 D2 09 58   41 FD 8E EF DF 92 03 D7  -1.....XA.......
#     00F0: 88 16 5B 88 A4 CC 54 6D   6B 74 E4 2D 34 F9 9A 84  ..[...Tmkt.-4...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.127 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 40 C2 E1 76 A1 B3 85 21   09 0A EF 7F 9C 89 1D 35  @..v...!.......5
#     0010: 17 87 E3 CE 1B D9 D5 3F   EE 58 6B 28 71 F4 46 47  .......?.Xk(q.FG
#     0020: 97 3C FA 84 BB 68 CE 31   08 E7 D8 57 9B 94 CD E0  .<...h.1...W....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.134 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:12.135 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.136 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.138 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 0C BC AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:56.000 UTC",
#       "not  after"         : "2024-01-25 03:14:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#           0010: 2B 0E 15 4D                                        +..M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 6B 40 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:49.000 UTC",
#       "not  after"         : "2024-01-25 03:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.168 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 3B 9E 09 73 BA 3D DF   32 C9 50 50 EA 7F 86 B0  4;..s.=.2.PP....
#     0010: 0F 99 88 B7 41 0B 8A F2   7D FF EE CA DA FA FC 25  ....A..........%
#     0020: 8A FD A4 06 1A DB F3 7A   17 01 BE E6 66 AB 19 31  .......z....f..1
#     0030: 77 8A 03 D2 D7 D6 6A 02   73 52 6E 93 98 85 AE A0  w.....j.sRn.....
#     0040: 37 CC 6C 64 A2 0A 04 B0   E1 9D 8E D7 9F 01 7D 3D  7.ld...........=
#     0050: A8 75 1D 26 79 D1 2B A9   75 E0 9D BE 31 0B A1 51  .u.&y.+.u...1..Q
#     0060: 29 B4 05 25 F2 B6 7C 1C   8A 9B 56 70 D7 F2 92 F8  )..%......Vp....
#     0070: 87 20 E6 52 39 BF 3F FB   0E 16 07 56 0B 16 20 C8  . .R9.?....V.. .
#     0080: DC F7 1D 12 EF F7 7D 4E   38 C1 ED 6E 69 C9 D6 CF  .......N8..ni...
#     0090: 83 89 C6 AD 31 9E F6 DA   62 69 66 A5 9C 39 0B 04  ....1...bif..9..
#     00A0: 75 29 46 A5 34 61 37 44   F4 D7 C5 B5 2C 99 98 0D  u)F.4a7D....,...
#     00B0: FE 0E 5E D0 E8 F5 CC 42   BA 0A BA 6D 81 25 B3 88  ..^....B...m.%..
#     00C0: 66 22 32 38 FC C1 08 2B   DF 83 5E E2 B2 3C 30 D1  f"28...+..^..<0.
#     00D0: B5 69 D5 FE 51 58 9A 3A   2A AF 60 27 14 33 4E BB  .i..QX.:*.`'.3N.
#     00E0: AB 57 9F 25 E9 E2 C3 C6   50 5E CB 87 6F 2A BF EA  .W.%....P^..o*..
#     00F0: F2 A2 05 E1 18 08 60 B8   8A E8 FC F7 1C B6 D0 B5  ......`.........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.169 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6C D1 70 DA D0 4F EF 85   DA A7 32 59 3E 26 A9 6C  l.p..O....2Y>&.l
#     0010: C4 23 66 3F 60 BC A3 44   E6 CF C2 51 F7 94 07 AB  .#f?`..D...Q....
#     0020: 2D 51 D1 43 68 05 2A 83   97 5A 47 87 DB FB 9E 5E  -Q.Ch.*..ZG....^
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.170 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.239 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.239 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.240 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:12.240 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:12.248 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "72 26 16 20 86 B5 B3 FB 5A 8F C2 A8 2A DD 61 AD BA E1 8D F4 E2 31 AF D8 1B 4C 48 F5 85 6B 53 8A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 03:15:13.017 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 03:15:13.018 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-27 03:15:14.290; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-27 03:15:14.294; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-27 03:15:14.656; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:14.658; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-27 03:15:14.658; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-UpWmEX/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:14.691 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 0C BC AF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:56.000 UTC",
#     "not  after"         : "2024-01-25 03:14:56.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#         0010: 2B 0E 15 4D                                        +..M
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:14.695 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "13 61 A7 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:47.000 UTC",
#     "not  after"         : "2024-01-25 03:14:47.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:14.706 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:14.888 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.888 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:14.890 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:14.890 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.894 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.905 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.905 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.905 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:14.907 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "C1 06 98 B8 B5 0D B1 A0 DF 25 F5 F7 5D E6 35 5D C9 67 CE 13 12 27 93 C3 C2 8F 39 26 4D 46 19 4D",
#   "session id"          : "D5 3C 8C 3E 07 A5 B3 EB 0D AE ED E7 FB 0F FB 8F A9 09 A5 C0 7E 42 BA 9A 23 3F 9D D3 00 DB AD 1E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 96 B6 4C DB 05 43 9A F1   69 B0 D6 9A 2A 50 FB CE  ..L..C..i...*P..
#             0010: AC D8 D1 81 E6 76 AC 92   2A DF AB 44 13 23 21 56  .....v..*..D.#!V
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.027 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B2 4A 46 17 24 03 21 D0 07 FD C9 0C BE 5F 19 53 A0 8D 22 58 82 2C 49 EE A9 3F 75 D6 27 3D 1B 41",
#   "session id"          : "D5 3C 8C 3E 07 A5 B3 EB 0D AE ED E7 FB 0F FB 8F A9 09 A5 C0 7E 42 BA 9A 23 3F 9D D3 00 DB AD 1E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 60 2D 99 04 64 17 F1 5B   9D 2C F3 32 01 76 F3 6F  `-..d..[.,.2.v.o
#           0010: C5 E2 CD 27 E2 C4 A5 23   55 B9 F3 DC 32 08 84 5B  ...'...#U...2..[
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.028 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.033 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.033 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.034 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.036 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.037 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.044 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.054 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.056 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.066 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.070 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.071 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.072 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.073 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.073 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.073 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.077 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.077 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.077 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.080 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 9F 91 E7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:52.000 UTC",
#       "not  after"         : "2024-01-25 03:14:52.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 04 AB A4 B3 D3 51 D5 19   F9 89 EE 5D B8 B8 21 04  .....Q.....]..!.
#           0010: 1A 82 5A 26                                        ..Z&
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.080 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.143 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 6B 40 84",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-27 03:14:49.000 UTC",
#     "not  after"         : "2024-01-25 03:14:49.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#         0010: A6 D3 DF F5                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#         0010: 6D CF 55 EF                                        m.U.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.146 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F 07 12 CC 16 60 8F B9   86 E3 23 F0 BD 90 D6 97  /....`....#.....
#     0010: 9F CA EE 81 BA 03 34 DB   3D CB 6C A5 07 63 1E 22  ......4.=.l..c."
#     0020: E7 3B 57 58 60 29 2E 17   E2 E0 62 E6 85 39 1F 8B  .;WX`)....b..9..
#     0030: 2F 12 FB 3A 31 BE 2F 4D   71 D2 6A 09 3F A4 6B F2  /..:1./Mq.j.?.k.
#     0040: 7A C5 A0 7A 75 79 2B D5   AE 52 DD 77 85 B3 D3 91  z..zuy+..R.w....
#     0050: F7 84 86 29 FE 91 6F 3A   3A 6E A1 ED 67 2E 63 48  ...)..o::n..g.cH
#     0060: 14 99 97 7E 4E 75 16 50   2D 57 0D CF DD 8E 4C 9D  ....Nu.P-W....L.
#     0070: 44 49 19 21 51 09 69 42   E7 59 45 F5 9A 34 37 90  DI.!Q.iB.YE..47.
#     0080: F8 FD FB 0F AD FB BB 2D   C0 2B EE 94 19 44 A6 DE  .......-.+...D..
#     0090: B7 24 69 0D 3B CA 3B 9F   88 02 EC AE CA 10 AD 5C  .$i.;.;........\
#     00A0: FA 30 BC B1 BB 5B DE 0C   3B 3B 21 03 91 9B 22 03  .0...[..;;!...".
#     00B0: 98 00 3E 73 B5 11 61 ED   C3 4E 39 41 ED E0 35 C0  ..>s..a..N9A..5.
#     00C0: 3C 21 71 5D 72 B0 A9 EC   15 45 3E F2 DB 3F 0B BB  <!q]r....E>..?..
#     00D0: 6E 0A F7 0C 8E A0 F7 EB   A6 59 CD E3 1B 68 87 39  n........Y...h.9
#     00E0: 79 58 EF 8E AB 2E 6F 2E   36 71 EF A3 95 F6 D6 BB  yX....o.6q......
#     00F0: 8C D2 58 E9 6D E2 F5 55   E9 1C 1A F4 1C 42 E9 47  ..X.m..U.....B.G
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.147 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 10 D3 2E 7F E6 DE F8 8B   42 0C 55 7B 94 78 9C A0  ........B.U..x..
#     0010: C5 77 5F C0 F2 76 91 D9   93 8F 7B AE 80 36 E8 9D  .w_..v.......6..
#     0020: 91 70 E2 7C 74 47 0C BA   30 54 E6 45 26 82 FE 45  .p..tG..0T.E&..E
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.249 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:15.250 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.250 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.251 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.253 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 0C BC AF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:56.000 UTC",
#       "not  after"         : "2024-01-25 03:14:56.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 36 40 B2 2E 15 3A 0A E8   EF E3 89 93 E7 E6 02 94  6@...:..........
#           0010: 2B 0E 15 4D                                        +..M
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 6B 40 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:49.000 UTC",
#       "not  after"         : "2024-01-25 03:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.275 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 25 DB 91 6E AD FA C1 12   A1 C0 98 7A 57 8D 73 B5  %..n.......zW.s.
#     0010: 8D 2B 8B C1 83 E6 CB D4   AD 02 95 D0 78 A3 9D 51  .+..........x..Q
#     0020: DC 73 8E DA 6C DD C5 81   F1 6B 23 C9 44 AE 3E C8  .s..l....k#.D.>.
#     0030: 9B 9B 38 C9 8E 91 56 4D   70 71 C8 67 57 97 C5 FF  ..8...VMpq.gW...
#     0040: 15 8D AB F2 7F 8D 5E 95   4C 4F 1F 05 B2 10 BE 8F  ......^.LO......
#     0050: 5B EB EF 8F 16 D7 41 55   49 FF CF 4E 2F 78 03 F0  [.....AUI..N/x..
#     0060: 02 6C 1C 88 75 74 DE F5   29 C3 43 58 22 D6 87 EF  .l..ut..).CX"...
#     0070: DB F7 AB D0 D1 22 97 D9   7F 10 B3 59 82 33 4A B9  .....".....Y.3J.
#     0080: C1 73 1D 5D 3C A7 36 27   A0 99 FC 49 ED 4F 42 83  .s.]<.6'...I.OB.
#     0090: ED D5 6B 86 B3 6D E4 34   C7 7C 2A 8A F3 16 DD AF  ..k..m.4..*.....
#     00A0: 6D 8E 9B E3 7B 20 51 22   C2 8F 93 C1 86 B5 AE 6D  m.... Q".......m
#     00B0: EA 06 E5 B9 53 86 D7 C2   73 FF C0 DA DF BF AC 9B  ....S...s.......
#     00C0: 55 44 E1 F1 32 7B 6A C9   EE FA 1A 47 7F 3F 9A 24  UD..2.j....G.?.$
#     00D0: 08 36 CC 4F A3 9B 32 83   28 92 63 C8 C1 00 0A D4  .6.O..2.(.c.....
#     00E0: CD 08 FE B4 90 FC 94 00   2B 56 9C 20 DC 49 E9 3E  ........+V. .I.>
#     00F0: 7A AF 44 0D 2F 4B 27 EA   7A 85 7A 83 40 25 73 9F  z.D./K'.z.z.@%s.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.277 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 90 E3 43 A8 07 1C 18 6A   07 D8 79 08 BB 53 00 B4  ..C....j..y..S..
#     0010: 5A 25 42 19 DF D9 D9 29   74 86 7A E1 4A 8F 4C 2E  Z%B....)t.z.J.L.
#     0020: C8 45 C7 23 C4 49 9B 4A   D3 8D 83 03 7C 8D B9 E1  .E.#.I.J........
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.277 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:15.346 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C5 D8 40 3C 7C 5D 71 B6 32 AB FF 37 14 73 FC 2D 5F 03 47 DA A2 EC 02 C5 E3 9C 0C EA 41 16 37 7C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-27 03:15:15.620 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-27 03:15:15.626 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-27 03:15:15.659 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-27 03:15:29.159; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:29.639 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 6B 40 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:49.000 UTC",
#       "not  after"         : "2024-01-25 03:14:49.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 23 84 E5 A6 F5 8B E1   01 BE 3B 92 3A 11 A7 58  .#........;.:..X
#           0010: 6D CF 55 EF                                        m.U.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "13 61 A7 84",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-27 03:14:47.000 UTC",
#       "not  after"         : "2024-01-25 03:14:47.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EE 2D F8 76 73 20 C1 84   56 80 95 0C 7C 45 81 A8  .-.vs ..V....E..
#           0010: A6 D3 DF F5                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-27 03:15:29.653 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:29.809 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.810 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:29.811 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-27 03:15:29.811 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.817 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.829 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.829 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.830 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-27 03:15:29.832 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "42 67 AA 20 A4 CF 16 E3 F5 C2 3C C2 3A 58 5B A5 92 B3 98 72 28 F5 FE 80 2B 27 EA B0 4A D3 C3 05",
#     "session id"          : "F3 C0 5A A9 DC F9 22 65 1D B9 7D 47 90 DD 4D 91 08 89 4C 38 E3 BD 74 40 51 2F 96 E3 3F 9C B4 E9",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D4 9A F6 78 F0 53 85 D9   57 C8 3F 73 A1 13 DA 95  ...x.S..W.?s....
#               0010: 4D 5D 28 4E 65 73 EE 24   35 8D 93 A5 BE 0D 6F 34  M](Nes.$5.....o4
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.848 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "26 BA 72 D0 44 C2 B4 C4 A8 F5 6F 2C 4D 04 B6 8B 2F 13 1B BF 61 D4 03 42 D7 33 3D CF B7 E1 DE 04",
#     "session id"          : "F3 C0 5A A9 DC F9 22 65 1D B9 7D 47 90 DD 4D 91 08 89 4C 38 E3 BD 74 40 51 2F 96 E3 3F 9C B4 E9",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 69 FB 21 01 12 04 A9 95   F5 5B 94 DF DE EF 57 90  i.!......[....W.
#             0010: 06 28 D6 16 03 19 07 14   D0 19 C6 DF A3 E8 26 3E  .(............&>
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.848 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.849 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.850 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.850 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.851 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.851 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.852 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.853 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.861 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.862 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.863 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.867 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.868 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.869 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.869 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.869 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.870 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.870 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-27 03:15:29.871 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:15:29.871 UTC|SSLExtensions.java:215|Ignore impact of unsupported extensio

[...truncated too long message...]

y.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-27 03:16:44.645 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:42000/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14603ms
ok 78 stop command for single port in 17739ms
ok 79 status detects locally running solr in 9521ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7360ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1097ms
ok 82 listing out files in 3042ms
ok 83 copying files around in 6587ms
ok 84 upconfig in 2611ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1259ms
ok 87 Cleanup in 2142ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 49s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/nr7ww2yoeqcto

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8255 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8255/

All tests passed

Build Log:
[...truncated 1429 lines...]
BUILD FAILED in 1h 2m 52s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/e6c4nvlyg4lyu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8254 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8254/

All tests passed

Build Log:
[...truncated 1434 lines...]
BUILD FAILED in 1h 1m 30s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/mbe6aqqn3gxyg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8253 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8253/

All tests passed

Build Log:
[...truncated 1163 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:41111/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-26 18:22:28.023; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 18:22:28.027; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41111/solr] to [https://127.0.0.1:41111].
# WARN  - 2023-10-26 18:22:28.846; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 18:22:28.881; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17084ms
ok 74 start solr with client truststore and security manager in 19921ms
not ok 75 start solr with mTLS needed in 60800ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-e7xD3M/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41111 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41111 (pid=1489663). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41112 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41112 (pid=1489790). Happy searching!
#
#     INFO  - 2023-10-26 18:23:32.509; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 18:23:32.532; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 18:23:33.568; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:33.570; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:33.571; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:33.608 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 7C 92 B2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:18.000 UTC",
#     "not  after"         : "2024-01-24 18:23:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#         0010: 3F 34 DF D3                                        ?4..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:33.612 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 99 B9 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:09.000 UTC",
#     "not  after"         : "2024-01-24 18:23:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:33.624 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:34.327 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.328 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:34.330 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:34.330 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.355 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.376 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.377 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:34.388 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F7 D7 69 F4 17 F8 E8 B2 9D 84 9C 0D 4A 59 7B C9 B1 CB 2C 40 C8 AE BF D3 E7 74 BF 75 BE 9F E1 15",
#   "session id"          : "FB 94 F7 D5 DC 36 55 46 9F 9F 94 FA 4C A1 22 1B 05 58 91 21 BA DC 79 D2 E7 15 1E CD 57 CD 26 E4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 11 B5 5C 2D 20 92 38 49   F2 B0 ED A4 80 49 C0 0C  ..\- .8I.....I..
#             0010: D1 A4 46 1E 34 E3 70 CD   62 23 7D 89 81 0E B0 2F  ..F.4.p.b#...../
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.802 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4F 3D 5E FB 66 DB A1 88 71 9D 1E E7 89 4A 25 CD 22 31 CB 1E C9 B9 96 B4 B5 CE 5F 6C 3D 5A 8A A4",
#   "session id"          : "FB 94 F7 D5 DC 36 55 46 9F 9F 94 FA 4C A1 22 1B 05 58 91 21 BA DC 79 D2 E7 15 1E CD 57 CD 26 E4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 87 51 BA E4 90 17 E1 AC   BB 50 A5 C5 65 A3 E2 29  .Q.......P..e..)
#           0010: 55 06 A8 3A 3A CB 54 34   3D A2 9F B3 13 34 EB 6D  U..::.T4=....4.m
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.802 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.802 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.807 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.807 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.808 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.828 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.845 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.846 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.847 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.861 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.862 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.886 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.887 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.892 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.892 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.893 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.897 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:34.897 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.901 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 C1 CA 3E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:13.000 UTC",
#       "not  after"         : "2024-01-24 18:23:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B FD AE 01 24 E7 3A 9E   42 A9 1E FC B6 FB 73 3B  ....$.:.B.....s;
#           0010: 72 52 52 FA                                        rRR.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:34.902 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.200 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.200 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.200 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:35.201 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.229 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.237 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A6 5B 36 A3 EF 14 96 C0   91 83 7F 2B AE F3 BC 92  .[6........+....
#     0010: AA 15 85 2D 11 31 5E 1A   C6 1D F8 61 12 11 AE A5  ...-.1^....a....
#     0020: 3F A7 8D 16 1F 21 F1 86   18 8D CA E4 95 06 0B BB  ?....!..........
#     0030: DE FA E1 7A 04 D8 29 0B   B4 FC 0B 0D 46 47 4B 99  ...z..).....FGK.
#     0040: A4 F0 45 1D EA D0 7B A5   B9 95 F9 D5 86 4B 48 9F  ..E..........KH.
#     0050: 12 C5 CC C2 8D 73 36 F2   19 67 B7 4D E5 BB 3D D3  .....s6..g.M..=.
#     0060: 06 45 7A AF A5 2A 60 B1   3E F4 40 2A 40 9F F5 44  .Ez..*`.>.@*@..D
#     0070: F1 B9 C4 56 E3 1A 19 1F   2E 3D E6 AB 47 47 5D 01  ...V.....=..GG].
#     0080: 9B 17 D0 11 AF 76 6E 0C   A2 B0 5F 1D 9F 05 59 4B  .....vn..._...YK
#     0090: 4F 2A A3 D6 FF 7A 6D D2   D4 40 5B EC 36 3D 41 66  O*...zm..@[.6=Af
#     00A0: 4E D8 B3 7E 87 67 07 01   0F D0 AD 1D FB D8 53 0B  N....g........S.
#     00B0: 88 26 01 80 8A 0D A8 52   B1 0D 7F 16 FF 14 14 2A  .&.....R.......*
#     00C0: D5 62 BE CD BB 40 EB 6C   FF E0 69 0E 9A 30 56 EC  .b...@.l..i..0V.
#     00D0: 6E B7 23 31 43 34 39 E2   11 CB 1A E8 CF F8 BB A8  n.#1C49.........
#     00E0: D5 2C 28 BC C2 E1 52 2B   DE 4E C7 1D 18 B1 3D 5F  .,(...R+.N....=_
#     00F0: 48 42 DF B8 B8 BC 31 1F   F0 74 10 CC 04 B3 39 6E  HB....1..t....9n
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.239 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6F AA 37 41 5C 2B BF FB   87 DA AB 23 BC 7D 53 4F  o.7A\+.....#..SO
#     0010: 20 78 84 2F C6 7C C8 45   D9 E5 7D 79 91 A2 5D 35   x./...E...y..]5
#     0020: 6E D4 B1 1D 17 81 D1 19   55 58 1E 46 53 B7 51 3A  n.......UX.FS.Q:
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.247 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:35.248 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.249 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.258 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E 7C 92 B2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:18.000 UTC",
#       "not  after"         : "2024-01-24 18:23:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#           0010: 3F 34 DF D3                                        ?4..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 76 7B 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:11.000 UTC",
#       "not  after"         : "2024-01-24 18:23:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.314 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 03 C2 A1 5A 68 36 13 ED   8D 52 C9 AB D5 DC 0A 9B  ...Zh6...R......
#     0010: 79 29 68 5D 7F 6C 04 E7   7A CE B2 7A 60 D3 36 A4  y)h].l..z..z`.6.
#     0020: 7C 8C CD 2F 6B 63 BF 05   6C A0 4C 66 FB DD 86 2F  .../kc..l.Lf.../
#     0030: 91 CE F2 92 69 9A 49 25   91 84 05 87 67 C5 FC 46  ....i.I%....g..F
#     0040: 41 DA 0A 0E EA E0 24 CB   F7 2B D8 22 BC DE 83 96  A.....$..+."....
#     0050: CC 82 18 D5 C6 11 80 7F   01 90 C1 82 4C A6 9C C1  ............L...
#     0060: B5 F2 70 2E 14 CC CA 34   8B 1F 12 4D 3F 9B 43 FE  ..p....4...M?.C.
#     0070: E0 C2 70 B9 58 0C AD CD   F6 0E 3F 15 27 A9 1C 2C  ..p.X.....?.'..,
#     0080: 7F 0A 77 08 72 B1 B5 E1   88 25 1B 44 C0 8B E4 E1  ..w.r....%.D....
#     0090: 15 F0 71 CB 37 24 F2 7B   AD F1 B1 6E 5C 69 55 A9  ..q.7$.....n\iU.
#     00A0: D4 0F CB DB 5A A2 46 30   1C 69 65 FF 86 31 3A 5D  ....Z.F0.ie..1:]
#     00B0: 6F 15 B7 53 F7 6F 83 F4   95 A6 92 24 0B 04 58 29  o..S.o.....$..X)
#     00C0: CA 54 99 2F 03 8F E6 19   B6 1F 57 C7 C6 64 C0 1D  .T./......W..d..
#     00D0: C3 2C 34 30 7E 86 D8 50   27 AD 74 69 70 7D AD 2E  .,40...P'.tip...
#     00E0: D1 71 FB 62 DD B5 31 6A   80 07 23 7C B7 C4 33 EF  .q.b..1j..#...3.
#     00F0: C2 7C 33 0C 41 B9 4D 4A   E1 E0 04 28 55 93 02 BA  ..3.A.MJ...(U...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.315 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 9F B6 21 B6 20 DB A9 DB   92 90 52 DE 38 78 EA 39  ..!. .....R.8x.9
#     0010: 91 20 00 BC B1 5D B1 ED   B1 58 01 A4 14 BD FA 9C  . ...]...X......
#     0020: BD 92 DB 21 AC 39 B9 4B   A8 A7 2F 09 6B CC 8B 09  ...!.9.K../.k...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.316 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:35.629 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FF 29 4C BD 56 0B E1 F1 D4 46 8C 22 82 4E 87 FF 84 A3 99 8E AD 2D 97 C2 40 5D 43 CE 8D D1 E1 55",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 18:23:37.070 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 18:23:37.071 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 18:23:38.449; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 18:23:38.456; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 18:23:38.814; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:38.816; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 18:23:38.816; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-e7xD3M/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:38.853 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 7C 92 B2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:18.000 UTC",
#     "not  after"         : "2024-01-24 18:23:18.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#         0010: 3F 34 DF D3                                        ?4..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:38.857 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "73 99 B9 F2",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:09.000 UTC",
#     "not  after"         : "2024-01-24 18:23:09.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:38.868 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:39.369 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:39.372 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:39.372 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.377 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.389 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.389 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.390 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:39.392 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "3B 8A 3D 19 2A 7C 09 B1 62 CC 56 DA E5 8D 63 05 77 76 84 0F E0 B9 F0 A4 F3 7D C5 97 F7 37 42 89",
#   "session id"          : "C7 F7 47 DD 04 E2 6E D0 A6 44 2B CC DA 8F BC AA AD 45 D9 65 00 55 C5 6A 38 2A 21 7B 1C BF 7D 0D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 11 7E E8 0E 71 1D 06 DD   DD 95 C1 48 65 40 7D E4  ....q......He@..
#             0010: B4 A6 A8 0B F1 A0 F1 33   23 D1 52 36 EC 6B BA 15  .......3#.R6.k..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.512 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "19 22 21 07 2F E8 09 B6 D8 D9 21 97 51 79 99 34 D4 F4 2B 41 6D 7A 6B 95 C0 47 6E 7F 2F F3 FB 89",
#   "session id"          : "C7 F7 47 DD 04 E2 6E D0 A6 44 2B CC DA 8F BC AA AD 45 D9 65 00 55 C5 6A 38 2A 21 7B 1C BF 7D 0D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 8E F1 4B DB 5C 00 CA 55   D4 26 B8 56 01 50 79 44  ..K.\..U.&.V.PyD
#           0010: 98 9C DF C6 7F C7 8D 80   05 04 6A 6B 9A 34 C8 7D  ..........jk.4..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.512 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.512 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.516 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.517 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.517 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.519 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.525 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.530 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.566 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.569 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.572 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.576 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.577 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.579 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.579 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.580 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.580 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.581 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.583 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.583 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.583 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.584 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.587 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.588 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.588 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.592 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "03 C1 CA 3E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:13.000 UTC",
#       "not  after"         : "2024-01-24 18:23:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8B FD AE 01 24 E7 3A 9E   42 A9 1E FC B6 FB 73 3B  ....$.:.B.....s;
#           0010: 72 52 52 FA                                        rRR.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.595 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.644 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.645 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:39.645 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.677 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0A 76 7B 72",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 18:23:11.000 UTC",
#     "not  after"         : "2024-01-24 18:23:11.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#         0010: EB 72 44 5A                                        .rDZ
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#         0010: A7 12 60 5C                                        ..`\
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.681 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 46 CE C7 D7 19 7F 8B AF   19 1A D2 C8 71 96 76 3A  F...........q.v:
#     0010: 48 03 09 32 CD 0F E4 0B   85 C1 43 7A 10 07 EE 8B  H..2......Cz....
#     0020: 9B 9B 42 98 F1 B7 C7 E5   69 78 C7 B2 79 BD A4 44  ..B.....ix..y..D
#     0030: C1 CD 13 2D 0D BC BF 44   C8 F8 CD B5 AC 5C 7B 09  ...-...D.....\..
#     0040: 0C 2F 73 B8 F1 EA 35 73   04 E7 6D 8A 6F 1B 2C 7D  ./s...5s..m.o.,.
#     0050: 83 22 30 22 95 92 D3 AC   A9 CB D5 0B EA A3 B0 A9  ."0"............
#     0060: 84 07 BB 8E EB F3 67 73   C4 BB 4B D3 A9 05 28 51  ......gs..K...(Q
#     0070: 2A 71 8E A6 51 EB D9 78   93 3D E1 B9 18 51 1D A7  *q..Q..x.=...Q..
#     0080: F0 2E 62 B2 19 9B 50 D6   E5 58 27 01 84 4F 3C F3  ..b...P..X'..O<.
#     0090: 91 A1 DE 1D A7 FF E8 10   C8 DA C6 9D B3 92 1B B6  ................
#     00A0: 25 EB C3 E7 58 77 81 E0   4F 08 03 72 C2 22 B7 FD  %...Xw..O..r."..
#     00B0: BE 79 4F CC 3B 0E 46 97   FF 7D 64 91 31 7B 27 4E  .yO.;.F...d.1.'N
#     00C0: C1 40 CA 07 93 3B 59 F6   98 6B 82 C9 3E 41 2E D1  .@...;Y..k..>A..
#     00D0: A5 AD E7 F6 C0 08 44 E3   A4 06 75 38 FC 3F 4D D4  ......D...u8.?M.
#     00E0: ED F0 F9 1F FA 65 9B 60   2B 59 F4 7E 96 38 4D AF  .....e.`+Y...8M.
#     00F0: 2E DB E7 6E AE FA CC C6   BB C9 3D 47 4F FF 93 2A  ...n......=GO..*
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.683 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 04 F2 5A B5 ED 1D 4E 20   F0 96 8A 47 F3 DC A5 96  ..Z...N ...G....
#     0010: 0D C3 57 AC 93 80 F7 6A   78 70 72 67 47 22 7D 6A  ..W....jxprgG".j
#     0020: 1F B2 71 01 09 05 E4 6D   44 7B 34 9F 25 C2 65 08  ..q....mD.4.%.e.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.684 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:39.685 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.685 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:39.685 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.686 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.689 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3E 7C 92 B2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:18.000 UTC",
#       "not  after"         : "2024-01-24 18:23:18.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 9E AD B3 46 F3 42 53   A2 C4 81 ED EA 81 3B A6  ....F.BS......;.
#           0010: 3F 34 DF D3                                        ?4..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 76 7B 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:11.000 UTC",
#       "not  after"         : "2024-01-24 18:23:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.720 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 53 30 66 25 FA 11 2A 09   AA 2F 88 3B 8D E0 89 85  S0f%..*../.;....
#     0010: 4D 6B A3 A1 40 43 B2 F6   5E 7E 42 E3 DF 0E 69 7C  Mk..@C..^.B...i.
#     0020: 18 08 2C E6 88 13 CA 29   61 22 40 4F 79 55 F8 12  ..,....)a"@OyU..
#     0030: A0 F7 04 9B F0 99 E2 46   F6 B6 BB AB 75 D9 10 78  .......F....u..x
#     0040: 9B 5D 1C 8F DE 7D 8E AD   96 F0 B9 01 51 EA A6 5F  .]..........Q.._
#     0050: FF 25 97 3A 82 F0 FC B7   3A 7B 03 32 45 7C 56 B5  .%.:....:..2E.V.
#     0060: CA 4F 16 66 40 5B C8 E6   AC 34 C0 76 23 03 9F 03  .O.f@[...4.v#...
#     0070: 97 7E 50 9F 97 1C AB 57   73 0A 93 7D B3 F0 07 91  ..P....Ws.......
#     0080: 77 B8 7A B2 65 46 4B B6   97 9B DE E2 09 8E 28 0F  w.z.eFK.......(.
#     0090: DD A6 2F 2E A0 56 C4 D6   25 38 F3 AC 6B 62 B2 EA  ../..V..%8..kb..
#     00A0: 00 BB 39 2B 2C 33 EE 7D   69 1A 7B A1 85 69 9A 0D  ..9+,3..i....i..
#     00B0: 1A 0F E3 6F 39 AF EB 41   82 E7 6F 86 C0 58 CB 7D  ...o9..A..o..X..
#     00C0: A5 AC D6 0C BC FB D2 0E   63 D9 65 6D 23 0E F4 AD  ........c.em#...
#     00D0: 6F F2 39 7B 1E CF 2F 21   FC 5B 67 C5 E4 92 4D 26  o.9.../!.[g...M&
#     00E0: 4E DC ED 66 DB 68 D3 E2   9B 81 0C FC C1 6A 62 06  N..f.h.......jb.
#     00F0: 2B 95 55 88 1D 15 81 DE   7D 66 CC 84 19 1D 54 E1  +.U......f....T.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.721 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 12 F0 47 D1 C6 85 D8 36   BE D9 EC CD 33 B0 EC AE  ..G....6....3...
#     0010: 5A F2 62 F4 CD 7B 29 DE   FC 92 CF E1 4D 0B B1 A9  Z.b...).....M...
#     0020: C5 80 69 7E 69 E8 46 6E   FE C2 61 14 0A 12 41 C8  ..i.i.Fn..a...A.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.722 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:39.775 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F1 6A 6D 3C D2 42 34 6C 51 C5 30 01 65 3E 26 92 BC 51 5C 15 A5 3B ED 96 51 58 C3 9C 44 F5 F5 E0",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 18:23:40.069 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 18:23:40.070 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-26 18:23:57.237; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:57.775 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0A 76 7B 72",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:11.000 UTC",
#       "not  after"         : "2024-01-24 18:23:11.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 BD BF 83 3F 99 CF CD   09 AB BE B9 5B 27 48 EE  ....?.......['H.
#           0010: A7 12 60 5C                                        ..`\
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 99 B9 F2",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 18:23:09.000 UTC",
#       "not  after"         : "2024-01-24 18:23:09.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 77 CB FF 64 01 D5 E2 10   27 E4 13 C0 CE 87 53 34  w..d....'.....S4
#           0010: EB 72 44 5A                                        .rDZ
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 18:23:57.789 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
#   javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:23:58.000 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:58.110 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.110 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:58.112 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 18:23:58.112 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.117 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.128 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.128 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.128 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 18:23:58.130 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "29 FA F3 3D 61 70 43 28 87 6A 40 9E 8F 9F 2F 87 54 05 4D 39 83 B0 EC 1B F8 C9 3E 11 7A 88 0B 04",
#     "session id"          : "C0 63 BD 81 17 CD 56 C9 0D 07 33 4A 8A C5 FF 55 35 00 E8 2E FC 87 8B C1 A8 2A 49 14 91 27 50 63",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: E8 70 26 0D 3C C1 05 2D   97 D1 4D 2E FD 84 FD 8D  .p&.<..-..M.....
#               0010: 9F F6 00 19 DC 9A 29 C4   44 F5 3F F3 9E 63 C0 77  ......).D.?..c.w
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.151 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "8B E9 C5 B2 C5 35 32 90 C3 E5 F2 7E 3A E2 28 7A 9E 84 D0 84 37 49 89 F5 B1 30 0D CF 13 F4 47 D1",
#     "session id"          : "C0 63 BD 81 17 CD 56 C9 0D 07 33 4A 8A C5 FF 55 35 00 E8 2E FC 87 8B C1 A8 2A 49 14 91 27 50 63",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5C 72 85 3E 2C 3B 38 DC   97 A3 FA B1 9C A7 BC 88  \r.>,;8.........
#             0010: AE 93 C5 07 00 46 4B 64   5B 46 21 41 FA D9 87 7D  .....FKd[F!A....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.151 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.151 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.152 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.153 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.153 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.154 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.154 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.155 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.156 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.156 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.156 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.163 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.165 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.169 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.172 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.172 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.172 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:23:58.173 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.174 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.175 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.175 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 18:23:58.175 UTC|SSLExtensio

[...truncated too long message...]

e.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 18:25:22.568 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.628 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.628 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.629 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 18:25:22.629 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:41112/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14369ms
ok 78 stop command for single port in 17771ms
ok 79 status detects locally running solr in 9638ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7432ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1112ms
ok 82 listing out files in 2979ms
ok 83 copying files around in 6646ms
ok 84 upconfig in 2591ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1248ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1256ms
ok 87 Cleanup in 2136ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 6s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/p6hwayglm35fy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8252 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8252/

All tests passed

Build Log:
[...truncated 1394 lines...]
BUILD FAILED in 1h 4m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/65rcwiuheopm4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8251 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8251/

All tests passed

Build Log:
[...truncated 1271 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40129/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-26 13:05:45.228; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:05:45.233; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:40129/solr] to [https://127.0.0.1:40129].
# WARN  - 2023-10-26 13:05:46.056; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 13:05:46.115; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16898ms
ok 74 start solr with client truststore and security manager in 19408ms
not ok 75 start solr with mTLS needed in 54801ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-XfGouV/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40129 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40129 (pid=765600). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40130 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 40130 (pid=765707). Happy searching!
#
#     INFO  - 2023-10-26 13:06:48.764; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:06:48.769; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 13:06:49.203; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:49.205; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:49.206; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@55795845(ca,h=[localhost],a=[],w=[]) for Client@625e134e[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:49.260 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1E 5B 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:34.000 UTC",
#     "not  after"         : "2024-01-24 13:06:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#         0010: 6A E9 69 7A                                        j.iz
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:49.281 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 47 14 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:25.000 UTC",
#     "not  after"         : "2024-01-24 13:06:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:49.322 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 13:06:49.946 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:49.956 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.957 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:49.958 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:49.958 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.972 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.989 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.990 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.990 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:49.992 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "5C 00 7A BC 7C C5 12 F5 FC A2 B6 1B C8 48 0E 1F D0 AC 36 A6 66 F6 BE F4 70 AF 75 8A 69 13 56 FF",
#   "session id"          : "87 2B E5 83 7D 58 69 12 B1 A5 C4 C0 D5 A5 2C 75 50 0D 8F 9E AC A8 B5 B1 AB 71 00 06 5B DC CF CF",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 68 36 B6 5B 24 FA F5 0B   17 2B 36 F3 E3 36 E5 A3  h6.[$....+6..6..
#             0010: 91 79 DC E1 0E F9 B0 30   3E B8 3D 9F EF B9 02 28  .y.....0>.=....(
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.541 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 D3 1E 47 45 0D 35 BF F3 1E 76 7F FA F9 2B F4 16 F8 48 2D BA 54 E2 0F 06 E2 85 FC F0 89 F3 7E",
#   "session id"          : "87 2B E5 83 7D 58 69 12 B1 A5 C4 C0 D5 A5 2C 75 50 0D 8F 9E AC A8 B5 B1 AB 71 00 06 5B DC CF CF",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F2 E7 32 CA 01 0D F8 CE   FC EB 70 19 56 C7 84 BE  ..2.......p.V...
#           0010: A6 25 18 4C 0C B8 AB 71   F1 F3 F8 0F C1 FD B4 6C  .%.L...q.......l
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.541 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.541 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.542 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.543 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.543 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.545 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.546 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.550 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.566 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.567 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.568 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.589 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.590 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.590 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.596 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.597 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.597 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.597 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.598 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.598 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.598 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.611 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 02 0B 7C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:30.000 UTC",
#       "not  after"         : "2024-01-24 13:06:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 89 56 A6 D9 EA 9F 78   50 7B C4 F0 4B 81 BF 90  ..V....xP...K...
#           0010: BA A7 B4 51                                        ...Q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.611 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.694 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.698 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 18 BF 1A C3 49 55 03 0F   6C DE 9A AC FD 1C CF 74  ....IU..l......t
#     0010: 04 FA DD 0A E0 2A 5A 7B   02 5A D5 69 E2 D4 C4 3C  .....*Z..Z.i...<
#     0020: 1E F1 B5 B6 E7 CF 87 75   65 81 6C DC 61 3F FA BD  .......ue.l.a?..
#     0030: C9 39 15 45 BE 94 24 E2   F5 F8 B8 DB 05 43 A1 36  .9.E..$......C.6
#     0040: BC 8C A6 F7 81 4E A4 E1   48 EA 2D 54 40 1F 6D 12  .....N..H.-T@.m.
#     0050: 06 68 32 8B 3C 77 C3 CF   94 AF 8E F4 26 0C 90 34  .h2.<w......&..4
#     0060: 54 26 79 FD 0B B8 EB 1E   F5 C0 D8 38 9B 0C B3 FA  T&y........8....
#     0070: 7B FD 61 6E BC DE A7 06   15 ED B4 60 4E 9B 76 52  ..an.......`N.vR
#     0080: 4A F0 8F 2F 97 A4 D8 1C   5E 21 63 A0 83 12 B3 5F  J../....^!c...._
#     0090: 7D B4 07 97 1F B7 47 24   6F 06 2A 9A D6 01 CB 1E  ......G$o.*.....
#     00A0: 68 4D 67 CA 8C 83 6B 97   12 97 B5 33 42 9E B1 B9  hMg...k....3B...
#     00B0: 19 22 16 C7 92 61 41 C8   EA EB B2 A4 8D F5 49 CE  ."...aA.......I.
#     00C0: F7 5D 88 95 6A 72 8E 31   AD A2 C9 B1 B8 F1 97 B1  .]..jr.1........
#     00D0: FA B3 C2 18 F7 3D 4A 31   32 7A CC 69 0A 44 45 83  .....=J12z.i.DE.
#     00E0: A3 B1 CC 13 26 64 05 3A   DF 68 E9 99 ED AB 0B 4F  ....&d.:.h.....O
#     00F0: A5 51 1D 88 2B C2 5B F1   F1 4C 0F AA 51 CA FF 0F  .Q..+.[..L..Q...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.700 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CA 8C D0 E6 3E 02 9C F6   B7 0B D0 F6 7D 92 75 DD  ....>.........u.
#     0010: E4 4F D3 0D 59 5E 29 A6   60 19 0D 58 7B 17 5A 2B  .O..Y^).`..X..Z+
#     0020: E9 C1 13 67 25 EA AD 5B   99 9C 83 A8 A9 CA 5C A0  ...g%..[......\.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.703 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:50.705 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.706 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.708 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 1E 5B 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:34.000 UTC",
#       "not  after"         : "2024-01-24 13:06:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#           0010: 6A E9 69 7A                                        j.iz
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B1 A4 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:27.000 UTC",
#       "not  after"         : "2024-01-24 13:06:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.751 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 34 12 2C F9 F6 01 E5 24   3C B7 6E A7 61 F9 13 EA  4.,....$<.n.a...
#     0010: 31 7B BA E8 B8 4D 4C 75   F6 A5 8B BA FA 25 B0 01  1....MLu.....%..
#     0020: 12 92 C3 91 E7 8D 66 12   A4 6F 34 CE 51 E9 52 CE  ......f..o4.Q.R.
#     0030: 91 DF 46 12 77 80 F5 C8   75 31 AB 03 AF EE 96 A5  ..F.w...u1......
#     0040: 8E 25 29 05 F6 49 1D E9   A8 65 AD D6 3B D5 36 FF  .%)..I...e..;.6.
#     0050: F4 02 A0 22 D0 8A 95 3F   E8 67 90 5F 63 F8 DA 40  ..."...?.g._c..@
#     0060: 0C BA 74 9E 6A 50 DF 77   C8 27 FC CB 24 A8 34 3D  ..t.jP.w.'..$.4=
#     0070: 18 AD F2 DE 43 AF 3B F4   02 EA EB 7D 28 53 D2 E1  ....C.;.....(S..
#     0080: 3F 6F 7F 70 2A D0 73 E3   78 C5 6B 8D DE A0 AF 56  ?o.p*.s.x.k....V
#     0090: 0D 37 7B EA 31 1C 71 09   F1 27 FA 64 A6 7B 17 AA  .7..1.q..'.d....
#     00A0: D3 86 58 FF 9B 52 6B 55   4E 00 CF A3 1C 4D A0 61  ..X..RkUN....M.a
#     00B0: 27 7F 8A 57 C4 19 4E 5E   F7 84 65 3C 55 2F 5D 91  '..W..N^..e<U/].
#     00C0: 58 D1 DF 4A 76 18 7D FB   67 1E A2 A3 B1 E0 16 A4  X..Jv...g.......
#     00D0: F8 9B 99 C2 AA 09 CE A2   79 59 69 FB 2A 38 7E 01  ........yYi.*8..
#     00E0: 56 53 40 51 F3 5D 03 23   6E B0 A3 A0 70 1D 57 CE  VS@Q.].#n...p.W.
#     00F0: 3F 65 E1 F1 93 F2 6C 08   05 EE 2D 33 32 12 5D 9C  ?e....l...-32.].
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.752 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 17 92 22 F4 49 39 EE 22   5F 23 9F 43 7A 5C 64 21  ..".I9."_#.Cz\d!
#     0010: 5A F3 47 53 3A DB E9 76   68 7E 0A 9D B8 06 4A F0  Z.GS:..vh.....J.
#     0020: 88 7F 47 3E 71 EB 0A 9B   B8 3A E6 F8 E6 67 93 F5  ..G>q....:...g..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.755 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:50.865 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E2 B7 65 CE 40 53 15 40 75 76 6C C4 D5 C9 EC 3E 6F AD AB 59 5F 91 32 88 F6 A2 1A 52 3E 7B 5A A9",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 13:06:51.433 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 13:06:51.434 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 13:06:52.811; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 13:06:52.816; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 13:06:53.211; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:53.214; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 13:06:53.214; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-XfGouV/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:53.252 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "31 1E 5B 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:34.000 UTC",
#     "not  after"         : "2024-01-24 13:06:34.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#         0010: 6A E9 69 7A                                        j.iz
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:53.256 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 47 14 77",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:25.000 UTC",
#     "not  after"         : "2024-01-24 13:06:25.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 13:06:53.271 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:53.450 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.450 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:53.452 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:06:53.452 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.456 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.467 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:06:53.469 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BB 8D 7A 83 93 1E 82 80 17 4D 1F BC 4B E5 42 AB E7 50 AC D4 E4 2A 8E 46 09 A8 47 7B 1C 3E 5D 1A",
#   "session id"          : "A5 3E 3B 9E 1C D0 4E 96 E3 B7 CE C9 B1 B6 E9 99 5F 05 0E 9D F7 45 E7 9F 08 A6 A0 09 F1 0F 5F E7",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7F 6F 29 E7 78 2D BC A7   18 25 5A 49 C4 C3 3E 9B  .o).x-...%ZI..>.
#             0010: 80 A6 A3 44 6C 7B CD 42   9D 56 22 90 F2 34 81 02  ...Dl..B.V"..4..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.622 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D2 04 8F E1 D8 FD 8E 4A 55 D6 43 CD CD F1 CA 62 CA 50 D0 63 17 FE 7A 9F 92 1E FE 0B A4 1D 22 50",
#   "session id"          : "A5 3E 3B 9E 1C D0 4E 96 E3 B7 CE C9 B1 B6 E9 99 5F 05 0E 9D F7 45 E7 9F 08 A6 A0 09 F1 0F 5F E7",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 70 CE DE 9C CB 41 54 7F   90 33 68 C5 0B 04 69 15  p....AT..3h...i.
#           0010: 33 38 5A AD F4 07 89 53   48 B4 1D 0A EE 76 86 56  38Z....SH....v.V
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.623 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.623 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.624 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.625 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.626 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.627 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.628 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.630 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.631 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.639 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.642 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.643 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.646 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.647 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.648 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.648 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.648 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.649 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.649 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.650 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.650 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.652 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 02 0B 7C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:30.000 UTC",
#       "not  after"         : "2024-01-24 13:06:30.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C9 89 56 A6 D9 EA 9F 78   50 7B C4 F0 4B 81 BF 90  ..V....xP...K...
#           0010: BA A7 B4 51                                        ...Q
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.652 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.991 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 B1 A4 C5",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 13:06:27.000 UTC",
#     "not  after"         : "2024-01-24 13:06:27.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#         0010: 2A 19 4A 86                                        *.J.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#         0010: 1E 49 3C 34                                        .I<4
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.994 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 D2 A0 DD 2E C7 35 E0   A1 10 F8 3E 17 8B DF 17  Q.....5....>....
#     0010: 64 20 E5 4D 6B 53 3B 84   80 4E C4 FF E5 26 74 AC  d .MkS;..N...&t.
#     0020: 9B 09 B2 41 84 9B A9 B9   B7 F3 29 D8 87 AB A1 FD  ...A......).....
#     0030: 06 1F DD EB 19 B4 18 B7   29 90 D6 ED 7D AB 2E 18  ........).......
#     0040: DF 27 A7 5E 01 A8 CA B6   0D AD 70 E4 AE B3 57 AE  .'.^......p...W.
#     0050: 0C D4 E8 01 71 5F 1B 0A   B0 53 AD 12 14 7E 14 D8  ....q_...S......
#     0060: D9 93 27 55 53 54 13 AF   0B FA C0 FB A8 02 58 C0  ..'UST........X.
#     0070: 12 A7 80 38 4F ED 74 90   41 F2 10 5F 62 41 89 CF  ...8O.t.A.._bA..
#     0080: A5 8B 99 32 BA 81 65 C2   C0 E7 61 62 28 B7 1D 63  ...2..e...ab(..c
#     0090: 5E 77 FA C5 37 87 99 6F   18 A8 3A BD E3 D0 C2 00  ^w..7..o..:.....
#     00A0: 22 7F 2A F5 ED A5 F5 FF   0F E7 03 CD C6 EA 6E B2  ".*...........n.
#     00B0: C1 E6 F3 21 47 E7 BD D9   41 1A F2 1D 9A 75 FF 31  ...!G...A....u.1
#     00C0: 1A 43 C9 68 6B 73 97 A7   DF F9 72 D4 6B 82 64 95  .C.hks....r.k.d.
#     00D0: 35 9E 2B F5 E5 B7 3D EA   12 20 9D 9D FC 2A 1D E8  5.+...=.. ...*..
#     00E0: 7B CA 2E 63 9C A6 B3 3A   CF C8 9A 15 EF 57 25 18  ...c...:.....W%.
#     00F0: 52 BF 28 CF D4 06 B5 C0   97 01 23 E5 59 2C 4E 38  R.(.......#.Y,N8
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.995 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 78 84 B1 BC 28 BA 18 39   F9 BF 98 75 37 12 E1 D0  x...(..9...u7...
#     0010: 56 3E F2 A7 60 93 ED CA   EC 0A 0A 45 34 31 40 E4  V>..`......E41@.
#     0020: 22 1C F7 50 9C 93 EA 8B   DB 02 20 05 07 DD EF 34  "..P...... ....4
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.997 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:53.997 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.997 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:53.998 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.000 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "31 1E 5B 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:34.000 UTC",
#       "not  after"         : "2024-01-24 13:06:34.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1C 56 50 FF 45 C8 F3 C1   BA C2 E2 15 3D C5 12 72  .VP.E.......=..r
#           0010: 6A E9 69 7A                                        j.iz
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B1 A4 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:27.000 UTC",
#       "not  after"         : "2024-01-24 13:06:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.025 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 48 C4 C7 77 6C C3 18 6F   4C 86 3F EA 92 EF 26 EC  H..wl..oL.?...&.
#     0010: 9A 92 5F F0 29 B0 B2 B7   9E 68 44 40 C1 6F C1 3F  .._.)....hD@.o.?
#     0020: B8 09 11 24 B4 E6 66 D5   61 34 EE D2 E6 C0 E4 91  ...$..f.a4......
#     0030: DB F0 D0 4F F5 7D 22 65   6E F3 8E C9 FC 61 D1 1F  ...O.."en....a..
#     0040: AB 37 3C A6 4B 7C EB D6   04 51 99 21 1B 6A 89 0C  .7<.K....Q.!.j..
#     0050: 2F 95 A7 35 CA 48 A1 50   BD 29 20 E9 57 4E E8 C4  /..5.H.P.) .WN..
#     0060: 31 28 F5 3D 48 C2 E8 B2   0A 68 E6 44 4B EA 07 E2  1(.=H....h.DK...
#     0070: 27 08 4C 7A 7A 52 81 C7   FC DC B4 E7 9A FB E4 6B  '.LzzR.........k
#     0080: 95 63 1F 3F 3C 1F C3 CC   F7 B9 59 45 8A 6F 1A 5A  .c.?<.....YE.o.Z
#     0090: 33 15 FC 5F 34 94 FB 48   64 2A D9 25 BA 17 E1 68  3.._4..Hd*.%...h
#     00A0: 60 F0 23 F9 65 EE 12 33   3A 29 A7 33 D9 5E 39 63  `.#.e..3:).3.^9c
#     00B0: 67 FB 37 EA F7 89 1D 4C   4C C0 32 58 F9 D1 D9 D1  g.7....LL.2X....
#     00C0: 06 92 F0 B0 4F C7 4A 56   10 2A A7 49 57 1B A0 60  ....O.JV.*.IW..`
#     00D0: 7F 3E 97 5F 43 B6 D3 BA   28 C7 92 7F 6D 5C D6 67  .>._C...(...m\.g
#     00E0: 1F 4F 7B B0 83 64 C9 00   91 CF 0C E0 21 AD EB 24  .O...d......!..$
#     00F0: DB D1 49 0C 9A 8D 0F D7   88 CE B2 CB A9 59 28 15  ..I..........Y(.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.026 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 56 78 F2 23 7F 45 01 3A   8D 14 E6 39 16 76 98 E9  Vx.#.E.:...9.v..
#     0010: C5 52 59 A3 B7 D4 97 14   23 F9 3C E8 9B 15 4D D3  .RY.....#.<...M.
#     0020: AB C6 1B DC 0B C2 DC CD   A2 BD 6A 2A A7 5A A1 A1  ..........j*.Z..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.027 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:06:54.085 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "88 B2 FE C1 F3 FB DA D1 A7 91 AB 17 C1 30 93 80 75 AF CC E6 3A 37 70 F3 55 68 B8 87 ED 85 BB AC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 13:06:54.371 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 13:06:54.371 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-26 13:06:54.375 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine
# javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-26 13:06:54.376 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify (
# "throwable" : {
#   javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133)
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
#   	at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769)
#   	at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#   	at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#   	at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155)
#   	at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-26 13:07:07.576; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 13:07:07.948 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 B1 A4 C5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:27.000 UTC",
#       "not  after"         : "2024-01-24 13:06:27.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 23 32 EC A1 5F 76 EE A8   3B 5D 12 43 F8 4C 1B 59  #2.._v..;].C.L.Y
#           0010: 1E 49 3C 34                                        .I<4
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 47 14 77",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 13:06:25.000 UTC",
#       "not  after"         : "2024-01-24 13:06:25.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E0 78 7F 52 18 B9 97 EC   7D 73 C8 E1 FE C0 23 86  .x.R.....s....#.
#           0010: 2A 19 4A 86                                        *.J.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 13:07:07.961 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:07:08.488 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.488 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:07:08.490 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 13:07:08.490 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.494 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.504 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.504 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.504 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 13:07:08.506 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "26 CB 73 02 F5 B0 DC A9 9F 56 F9 63 AD FF 81 0B 61 80 A0 B6 1D B4 11 4F 97 35 6C 05 9D 59 FA AB",
#     "session id"          : "D1 46 9D E5 4F 09 04 D3 62 C7 B2 7D 1A 43 23 82 6E 83 6C 5E B1 70 20 B2 9A 86 48 5B D6 CB A2 E3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 2C 8D AA 69 11 18 40 2B   4C 7E B1 DF F6 6A 05 3B  ,..i..@+L....j.;
#               0010: 20 34 73 D1 94 0D 5A D3   61 6C 40 93 1A 4A AB 2C   4s...Z.al@..J.,
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.524 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D9 B1 50 04 62 27 84 0B F6 D4 47 5F BD 31 14 AF D6 0F 48 77 29 69 9B 98 2D 8D F5 26 D8 4D 0B 61",
#     "session id"          : "D1 46 9D E5 4F 09 04 D3 62 C7 B2 7D 1A 43 23 82 6E 83 6C 5E B1 70 20 B2 9A 86 48 5B D6 CB A2 E3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 67 1B 8C 99 81 0E 31 B9   F1 E2 3A E0 4D FE CC 07  g.....1...:.M...
#             0010: D5 C3 6D 85 7B 95 20 B5   AE 7B 0D 2E 5E F5 FE 27  ..m... .....^..'
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.524 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.526 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.527 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.537 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.539 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.540 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.543 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.543 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.544 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 13:07:08.544 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#  

[...truncated too long message...]

SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14773ms
ok 78 stop command for single port in 17721ms
not ok 79 status detects locally running solr in 1511ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7499ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1473ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2888ms
ok 83 copying files around in 6596ms
ok 84 upconfig in 2596ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1245ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
not ok 87 Cleanup in 2491ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 42014 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 42014 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 36s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/dszeggnocywt2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8250 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8250/

All tests passed

Build Log:
[...truncated 1393 lines...]
BUILD FAILED in 1h 6m 7s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/llp6p5tdzm5ta

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8249 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8249/

All tests passed

Build Log:
[...truncated 1405 lines...]
BUILD FAILED in 1h 5m 15s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/f7ninp5jwcaeo

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8248 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8248/

All tests passed

Build Log:
[...truncated 1162 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43477/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-26 05:22:22.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 05:22:22.590; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:43477/solr] to [https://127.0.0.1:43477].
# WARN  - 2023-10-26 05:22:23.536; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-26 05:22:23.575; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16550ms
ok 74 start solr with client truststore and security manager in 19547ms
not ok 75 start solr with mTLS needed in 50907ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-baNBEo/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43477 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43477 (pid=1251883). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43478 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 43478 (pid=1252050). Happy searching!
#
#     INFO  - 2023-10-26 05:23:25.202; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 05:23:25.216; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 05:23:26.019; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:26.021; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:26.022; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:26.095 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 1D F8 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:11.000 UTC",
#     "not  after"         : "2024-01-24 05:23:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#         0010: 5F D0 AB 82                                        _...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:26.111 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1C CE 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:03.000 UTC",
#     "not  after"         : "2024-01-24 05:23:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:26.138 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.477 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.478 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.478 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-26 05:23:26.478 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:26.564 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:26.566 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:26.566 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.576 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.605 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.605 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.605 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:26.624 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "30 22 83 63 D4 A5 A3 86 FE F7 6E A4 2D 90 96 5D DA 5B B5 27 90 2B 6C F3 13 6C 4A F1 AA D1 E2 CD",
#   "session id"          : "67 78 28 44 AC 95 C7 90 DB E1 BF D7 A8 F9 4E 6D 69 A5 D6 C4 28 DD 03 9F 10 27 FA E4 1A 4D E2 D8",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D0 5C 0E E6 27 77 EE 85   FD 09 7D 7D 58 21 77 A7  .\..'w......X!w.
#             0010: 8A 28 22 1D 77 73 C1 59   B5 37 FE 87 62 8F D2 3A  .(".ws.Y.7..b..:
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.952 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2B 71 C3 27 CB 7B 3B DB 05 3E B0 65 EA 4C 11 5F E7 02 53 4E 81 E6 8E 8E D1 E6 AC 5D E4 50 31 6C",
#   "session id"          : "67 78 28 44 AC 95 C7 90 DB E1 BF D7 A8 F9 4E 6D 69 A5 D6 C4 28 DD 03 9F 10 27 FA E4 1A 4D E2 D8",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F4 30 16 BC 2B 78 04 53   E3 B3 8A C4 D9 EE 28 DA  .0..+x.S......(.
#           0010: 41 86 B2 D0 ED EF F8 CE   EC 01 3C 6B 39 31 16 45  A.........<k91.E
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.952 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.953 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.959 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.976 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.977 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.978 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.981 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.981 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.981 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.982 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.983 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.983 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.983 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.984 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.984 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:26.985 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:26.985 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.002 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 90 59 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:07.000 UTC",
#       "not  after"         : "2024-01-24 05:23:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 B8 F7 87 E1 F1 D2 7D   53 13 9E A5 87 D6 CC 8B  ........S.......
#           0010: C4 DB A2 C9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.002 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.101 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.106 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 E1 0E 69 56 12 B8 A8   97 2B 82 B1 C4 0E 0D B9  ...iV....+......
#     0010: 9C 56 7F 47 85 26 41 1F   37 E7 C3 7B E9 F7 3A E0  .V.G.&A.7.....:.
#     0020: E0 60 A8 52 6F FF D7 87   C1 D6 0F 88 79 B2 59 98  .`.Ro.......y.Y.
#     0030: 2C 21 97 FB 76 C8 8F F1   A2 31 32 BC 7C 0D 64 75  ,!..v....12...du
#     0040: 78 60 C3 6E 48 F4 E3 EC   7B B0 35 4E BC 38 FF C8  x`.nH.....5N.8..
#     0050: E9 6A 8F 3E 3D 9A 93 9B   B9 5C FE 63 90 7F 63 C3  .j.>=....\.c..c.
#     0060: CF EC 5C B7 53 96 2E E7   DB 56 15 9C 77 85 7D E7  ..\.S....V..w...
#     0070: 91 D7 FC 40 3E 5D 17 CF   47 41 C7 1E FD 8B E4 59  ...@>]..GA.....Y
#     0080: 83 CA 77 C1 C5 7F DD 62   F3 A2 E2 16 74 C8 4D 50  ..w....b....t.MP
#     0090: B8 05 40 A4 ED 66 EA 26   0A A7 D8 BC 42 1E 13 85  ..@..f.&....B...
#     00A0: 22 92 99 86 EC 4E 63 6C   E4 8F 58 8C 9B 98 67 31  "....Ncl..X...g1
#     00B0: D1 96 EE 1E 03 B6 90 71   9D 96 F2 5B 91 6A BA B6  .......q...[.j..
#     00C0: FF C4 DC 32 48 2A 7D 17   07 E4 93 3D D3 05 51 1F  ...2H*.....=..Q.
#     00D0: A6 E8 C9 AD 8E F5 41 11   90 E9 90 6B 75 8F 8B D8  ......A....ku...
#     00E0: 36 95 16 B7 B3 4E 80 6F   86 7E 6A D0 EA 7C 75 48  6....N.o..j...uH
#     00F0: 72 F4 48 60 C9 D2 15 47   08 1D D2 FD A0 C5 DF 75  r.H`...G.......u
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.117 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: CC 6F 51 A9 C8 70 8C A4   A8 B9 FA 34 F9 CE A1 71  .oQ..p.....4...q
#     0010: EA CC 8C 5B E6 79 65 19   62 16 5E 51 16 0D D2 C5  ...[.ye.b.^Q....
#     0020: 66 70 7E AE BF D9 73 9B   04 55 91 20 03 49 63 29  fp....s..U. .Ic)
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.118 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:27.122 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:27.122 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.123 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.126 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 1D F8 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:11.000 UTC",
#       "not  after"         : "2024-01-24 05:23:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#           0010: 5F D0 AB 82                                        _...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 62 46 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:05.000 UTC",
#       "not  after"         : "2024-01-24 05:23:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.322 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 62 3B 3B 7F 36 62 C4 84   F8 51 45 C9 CD AE 87 F6  b;;.6b...QE.....
#     0010: FB A4 7A D9 97 2D DD 28   48 B5 0E 34 11 56 D3 72  ..z..-.(H..4.V.r
#     0020: 68 BE 66 1C C1 20 93 D8   4A 53 B1 56 E2 13 AB 3A  h.f.. ..JS.V...:
#     0030: 4E B0 98 E7 DB 8A AC 87   31 C0 AD BE EF 83 64 4D  N.......1.....dM
#     0040: 6B 0E 2B 20 89 89 38 5C   83 76 A5 15 54 03 F9 C2  k.+ ..8\.v..T...
#     0050: 10 27 BD 6F 9C 61 E2 0B   D3 B0 6F 83 91 F1 A5 0C  .'.o.a....o.....
#     0060: DC 5A 53 97 47 95 73 81   AC 64 A7 57 51 80 B9 3A  .ZS.G.s..d.WQ..:
#     0070: 5B 28 C2 12 71 ED 8F F0   FF 1F 83 26 89 02 17 38  [(..q......&...8
#     0080: 1A CE 16 AB E8 50 2A 05   7E 8A 51 9B D4 AC 33 D0  .....P*...Q...3.
#     0090: 85 FD 47 92 F3 CA E3 01   3B 89 3B FE 63 4A 9F 96  ..G.....;.;.cJ..
#     00A0: FA 52 A7 53 2F C8 08 0E   2C F8 A9 F0 29 28 3C 98  .R.S/...,...)(<.
#     00B0: 12 53 37 8E F1 96 49 02   CC 4E A2 5E 28 E4 C7 95  .S7...I..N.^(...
#     00C0: 90 C7 2E 48 42 C5 D5 B1   E5 8B AF D4 EC 6A 85 3D  ...HB........j.=
#     00D0: 8D 56 A5 11 47 05 B4 25   5F 61 93 65 D4 8A 57 C3  .V..G..%_a.e..W.
#     00E0: E7 AF 1F D5 A9 6B EC 0D   D6 DB 04 E6 43 69 C8 A2  .....k......Ci..
#     00F0: EE E6 92 D4 7A 2E 77 35   7B E9 21 13 04 C2 17 74  ....z.w5..!....t
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.323 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F6 33 11 7D 5C 0D 55 1A   F8 38 ED 99 13 50 FE B9  .3..\.U..8...P..
#     0010: 73 96 DE 88 D2 85 5D 46   A3 9A 68 D3 F3 73 3C 6B  s.....]F..h..s<k
#     0020: 9D 21 A5 A5 67 76 25 C2   8F F2 95 56 0F B8 59 01  .!..gv%....V..Y.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.326 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:27.461 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "D2 7B 31 F6 91 1C 4C C6 67 85 B4 2A A4 F2 58 BD 4B 1C 51 E7 2F 87 D1 0D 5D 66 B4 DE 43 14 A8 8F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 05:23:28.150 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 05:23:28.151 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-26 05:23:29.400; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-26 05:23:29.404; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-26 05:23:29.759; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:29.761; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-26 05:23:29.762; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-baNBEo/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:29.793 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "76 1D F8 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:11.000 UTC",
#     "not  after"         : "2024-01-24 05:23:11.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#         0010: 5F D0 AB 82                                        _...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:29.797 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5B 1C CE 19",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:03.000 UTC",
#     "not  after"         : "2024-01-24 05:23:03.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:29.808 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:29.961 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.962 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:29.963 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:29.963 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.968 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.978 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.978 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.979 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:29.981 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "90 FA FA FB 69 F2 AD 8C 6B 20 DE FE C8 7A CA 36 21 50 56 8F A3 F5 5F DF 50 F1 8C 63 A4 C4 F2 99",
#   "session id"          : "B1 66 29 7F 63 EE 06 57 66 4D F0 64 62 C2 32 D0 7C 98 86 2A C3 DC 1F 65 2F 64 A7 F3 66 9B 22 D5",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D6 D7 55 DA E7 45 9C 9E   B2 25 2E C2 31 05 BB 7D  ..U..E...%..1...
#             0010: A6 80 F5 2B 7A 59 55 59   87 90 79 E5 F4 F7 E6 0C  ...+zYUY..y.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.085 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "11 A3 A0 4B 56 3F 04 55 CF EE 6A C6 ED 74 D8 21 32 10 6E 1B CB 58 4A 66 E1 45 23 56 D5 F2 A8 24",
#   "session id"          : "B1 66 29 7F 63 EE 06 57 66 4D F0 64 62 C2 32 D0 7C 98 86 2A C3 DC 1F 65 2F 64 A7 F3 66 9B 22 D5",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D2 7A DB 0F BD 7F 9B 81   D9 16 20 58 19 A1 1B 41  .z........ X...A
#           0010: 3C 9D 2A F4 2B D4 03 63   68 26 8F B5 E2 22 23 35  <.*.+..ch&..."#5
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.085 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.085 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.087 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.088 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.089 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.089 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.092 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.097 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.098 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.099 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.111 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.113 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.115 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.118 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.118 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.119 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.121 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.121 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.121 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.122 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.122 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.124 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.124 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.124 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.127 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.127 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.128 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.129 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.136 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 90 59 43",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:07.000 UTC",
#       "not  after"         : "2024-01-24 05:23:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F1 B8 F7 87 E1 F1 D2 7D   53 13 9E A5 87 D6 CC 8B  ........S.......
#           0010: C4 DB A2 C9                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.136 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.202 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "69 62 46 7F",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-26 05:23:05.000 UTC",
#     "not  after"         : "2024-01-24 05:23:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#         0010: A1 57 98 FF                                        .W..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#         0010: 25 3A 7F 22                                        %:."
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.205 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3A 37 06 AD 00 EC FB B0   3B 01 55 31 87 F3 DA 02  :7......;.U1....
#     0010: 3B 70 85 79 0E 48 23 60   25 71 40 55 73 CC D2 52  ;p.y.H#`%q@Us..R
#     0020: EA 65 54 76 D8 18 AE FD   01 6A 64 D2 9D 56 8E 2C  .eTv.....jd..V.,
#     0030: 83 1F 22 88 3F 36 1D 8E   EB BB 21 A2 A6 84 80 40  ..".?6....!....@
#     0040: BB 29 FF F7 CC AC 57 0D   E7 80 5C B9 54 FC 95 C5  .)....W...\.T...
#     0050: 57 14 69 07 0C 16 AD 0E   35 64 13 26 4C 6D A9 2A  W.i.....5d.&Lm.*
#     0060: 8B 6E 13 91 95 C6 62 EA   51 15 10 8F 50 00 D3 45  .n....b.Q...P..E
#     0070: 1A 3E B6 21 71 ED 3D 81   52 8A 77 F9 5A 41 2A 8E  .>.!q.=.R.w.ZA*.
#     0080: F8 C0 61 B7 65 12 D4 0A   86 71 1C 13 2E D0 A1 E5  ..a.e....q......
#     0090: 6A 7D 16 D4 74 11 B7 94   88 61 E2 38 DA C6 E2 40  j...t....a.8...@
#     00A0: 31 BE F3 53 3C 32 C0 C0   88 91 E0 B7 C9 CD D0 DE  1..S<2..........
#     00B0: 24 8D 65 4A E7 2D D0 D6   5C B4 2C 88 85 FD 7B 55  $.eJ.-..\.,....U
#     00C0: 9B 2D 07 7F 52 02 BA 55   BB 6D BA 5C 65 60 4B 90  .-..R..U.m.\e`K.
#     00D0: B5 55 E1 AF 45 7C BD B0   C7 D8 C8 86 4F CD 3F 7B  .U..E.......O.?.
#     00E0: B0 08 0A 91 84 FB F8 BA   31 FE 9A 79 30 38 A9 68  ........1..y08.h
#     00F0: 78 29 86 52 9D 13 80 64   E2 F8 B2 A7 9B 3D 60 20  x).R...d.....=`
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.206 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4C 02 B7 3D 8B 1B 40 4F   FC D6 3F F9 A9 A9 4D 99  L..=..@O..?...M.
#     0010: 70 50 10 A4 17 5C AB CB   BB A1 17 0A 17 C8 92 89  pP...\..........
#     0020: C6 4C EA 45 08 5D 3C F8   12 C1 2C C0 D0 8E 0E 46  .L.E.]<...,....F
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.208 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:30.209 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.210 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.212 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "76 1D F8 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:11.000 UTC",
#       "not  after"         : "2024-01-24 05:23:11.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BF 7F AE 21 63 7E BF F9   78 FA 38 09 2D 54 93 C1  ...!c...x.8.-T..
#           0010: 5F D0 AB 82                                        _...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 62 46 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:05.000 UTC",
#       "not  after"         : "2024-01-24 05:23:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.235 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E 5F FA A4 B6 AD 2F B5   E0 93 F5 E3 2B 5C 12 0A  n_..../.....+\..
#     0010: 54 4E 55 53 D9 3B B2 8A   88 59 4E 92 8C 6B 93 E5  TNUS.;...YN..k..
#     0020: 54 E9 C5 AC 0D EF 51 67   72 27 5E 3A 2A 75 17 DA  T.....Qgr'^:*u..
#     0030: EB 3F D4 18 51 E8 AD 6C   CD 48 5B E8 39 1B BC 38  .?..Q..l.H[.9..8
#     0040: 62 7E A0 C4 91 20 15 BE   12 15 D8 85 BD F9 AD 02  b.... ..........
#     0050: 47 B8 F4 59 88 22 17 11   5E 48 49 6A 37 CD 46 4E  G..Y."..^HIj7.FN
#     0060: F2 BD CA 2C BF 7E B4 16   F9 EF B6 06 C2 33 7D 7B  ...,.........3..
#     0070: 6E 9C 33 08 EB C7 26 58   DE E2 94 0F 28 71 2C 4C  n.3...&X....(q,L
#     0080: 15 02 15 5F 61 A4 17 39   AB 0F D4 D8 ED 4C 6C B9  ..._a..9.....Ll.
#     0090: 0B 34 48 BE B2 43 07 97   2C 89 19 28 24 A3 48 36  .4H..C..,..($.H6
#     00A0: 22 F0 28 74 E2 4E BE 18   3B 1F 40 69 29 77 B3 A2  ".(t.N..;.@i)w..
#     00B0: C2 23 40 95 C6 C8 9F 42   86 4C 5A 60 7D 39 C9 AD  .#@....B.LZ`.9..
#     00C0: 7F BF B0 6D 40 BB E3 39   6E 78 44 5E E3 9A 62 8B  ...m@..9nxD^..b.
#     00D0: 55 F4 7B 6A 42 77 BF 7F   C9 4E 0A C2 13 14 91 AE  U..jBw...N......
#     00E0: 9D 2B BF 23 53 CE A0 41   F9 7C B8 99 23 F0 74 78  .+.#S..A....#.tx
#     00F0: 11 9F D5 35 F3 D8 D1 56   C7 46 CD 75 D7 90 A9 02  ...5...V.F.u....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.236 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F0 1D 9F 51 02 6B ED FD   3B 1A 90 AB 62 25 47 3B  ...Q.k..;...b%G;
#     0010: 9C 81 06 DD 54 89 D8 81   D8 2E B5 FC F5 D9 A8 90  ....T...........
#     0020: F1 87 4F CF 6A 90 61 13   8C C6 C5 49 91 F8 3C 3D  ..O.j.a....I..<=
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.236 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:30.295 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "99 0B 76 7C D4 AF AF 06 1E 7E 98 8F F1 ED 5A 21 88 D3 08 AB 57 51 78 A5 43 FB 7C 5E E4 B1 E0 32",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-26 05:23:30.548 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-26 05:23:30.549 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-26 05:23:30.565 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-26 05:23:44.104; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:44.454 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5B 1C CE 19",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:03.000 UTC",
#       "not  after"         : "2024-01-24 05:23:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "69 62 46 7F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-26 05:23:05.000 UTC",
#       "not  after"         : "2024-01-24 05:23:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 18 61 CA 6F 4D 48 55 02   33 6A 82 DD 4C BF 82 33  .a.oMHU.3j..L..3
#           0010: A1 57 98 FF                                        .W..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A 63 5B 4A DF CF 89 28   EF 7C 3E 21 17 5E 07 CA  .c[J...(..>!.^..
#           0010: 25 3A 7F 22                                        %:."
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-26 05:23:44.467 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:44.628 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.628 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:44.630 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-26 05:23:44.630 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.634 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.646 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.646 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.646 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-26 05:23:44.648 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "85 95 A0 BE 6F 34 1F 03 40 B3 BD 81 61 BF EF B2 AE 13 7A AB 04 46 72 05 1E 93 B1 1F 94 D1 62 C1",
#     "session id"          : "E2 07 D2 74 80 51 69 BD F3 F2 B1 96 FE 1E A6 60 CC 18 0C AE AE BE 30 03 9E 12 F6 DF 70 38 86 FA",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: DB 64 20 DA 5A 1F EA BA   83 7A 38 97 95 D6 E7 E2  .d .Z....z8.....
#               0010: 22 C8 C9 07 9F 99 01 16   B3 C0 5F 1C 72 9C C9 58  "........._.r..X
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.667 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "BC F5 75 AD 50 B1 A4 79 EF A3 30 43 7C 0D D4 90 4A 92 1E 6D 4D E4 1F 6C C6 1C DB 8F 1D 89 88 DB",
#     "session id"          : "E2 07 D2 74 80 51 69 BD F3 F2 B1 96 FE 1E A6 60 CC 18 0C AE AE BE 30 03 9E 12 F6 DF 70 38 86 FA",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA D8 D8 49 9E 3E 25 52   F8 D3 4E 63 9A 04 03 55  ...I.>%R..Nc...U
#             0010: C6 BD C1 C0 93 A9 23 55   27 B7 F1 20 99 E1 92 7A  ......#U'.. ...z
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.667 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.667 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.668 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.669 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.671 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.672 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.673 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.682 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.684 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.685 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.689 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.691 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.692 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.692 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:23:44.692 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-26 05:23:44.701 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
#   "Certificate": {
#     "certificate_request_context": "",
#     "certificate_list": [
#     {
#       "cert

[...truncated too long message...]

y.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-26 05:24:57.923 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43478/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14523ms
ok 78 stop command for single port in 18606ms
ok 79 status detects locally running solr in 9648ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7428ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1126ms
ok 82 listing out files in 3011ms
ok 83 copying files around in 6646ms
ok 84 upconfig in 2606ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1244ms
ok 87 Cleanup in 2086ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 55s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/wvenjdlkwvo4y

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8247 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8247/

All tests passed

Build Log:
[...truncated 1559 lines...]
BUILD FAILED in 1h 5m 50s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vkvyixryih34q

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8246 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8246/

All tests passed

Build Log:
[...truncated 1562 lines...]
BUILD FAILED in 1h 5m 16s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/jabc27uv4zxky

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8245 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8245/

All tests passed

Build Log:
[...truncated 1165 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:43585/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-25 18:20:52.243; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:20:52.249; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:43585/solr] to [https://127.0.0.1:43585].
# WARN  - 2023-10-25 18:20:53.162; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 18:20:53.201; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16373ms
ok 74 start solr with client truststore and security manager in 19811ms
not ok 75 start solr with mTLS needed in 56234ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-vHw9CF/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 43585 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 43585 (pid=3882620). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 43586 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 43586 (pid=3882788). Happy searching!
#
#     INFO  - 2023-10-25 18:21:54.676; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:21:54.681; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 18:21:55.831; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:21:55.834; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:21:55.839; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:21:55.912 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 BB 0D 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:41.000 UTC",
#     "not  after"         : "2024-01-23 18:21:41.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#         0010: FA 54 1B A6                                        .T..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:21:55.920 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F 4C AB AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:32.000 UTC",
#     "not  after"         : "2024-01-23 18:21:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:21:55.935 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:21:56.511 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.511 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:21:56.524 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:21:56.524 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.529 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.564 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.564 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:21:56.566 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "16 76 70 F3 0D 64 76 17 F0 F4 DC 77 CC 6A CF B3 89 31 19 0C 71 13 FA F1 86 0C C5 85 5A C4 E2 C2",
#   "session id"          : "57 D1 9D D5 89 F9 9D B5 A1 4A F6 AD 70 81 76 F4 1C 5E 12 01 FC 89 48 1A 18 8B 6E F9 5E 00 E2 C4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 37 5A BA 22 67 C0 63 9B   E1 7E 61 AE 2D 0D B7 97  7Z."g.c...a.-...
#             0010: 40 35 65 AD F6 C7 FC 16   E8 8F 19 15 E1 9C FD 63  @5e............c
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.965 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "06 BE 06 EA CF A4 DB AE A1 53 55 49 2B B4 CB 1B 9F 6A 83 17 EF A4 4E B9 D0 0C 8F 01 48 A8 4C 65",
#   "session id"          : "57 D1 9D D5 89 F9 9D B5 A1 4A F6 AD 70 81 76 F4 1C 5E 12 01 FC 89 48 1A 18 8B 6E F9 5E 00 E2 C4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3A C4 78 32 00 58 FC 09   73 12 84 34 14 6C 46 43  :.x2.X..s..4.lFC
#           0010: 3C 64 1D 1D 9C BD 1A D8   1F 65 AE DD 8E 53 FC 30  <d.......e...S.0
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.965 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.966 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.983 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.983 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.984 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.990 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.995 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.995 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:56.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.030 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.045 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.047 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.051 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.052 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.052 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.054 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.055 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.055 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.056 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.068 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.068 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.068 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.069 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.069 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.070 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.070 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.081 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 22 71 0F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:37.000 UTC",
#       "not  after"         : "2024-01-23 18:21:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 1B 4B B5 54 BE C8 0F   4A AD E2 ED C8 07 82 7C  W.K.T...J.......
#           0010: 1E B2 5D FA                                        ..].
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.082 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.225 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.426 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3E A7 97 E1 B0 C1 39 8F   65 8B 29 88 E7 C1 87 6E  >.....9.e.)....n
#     0010: 8E C7 6D 94 FA F8 EF A7   B2 56 4E 49 EE 8E 1D 3F  ..m......VNI...?
#     0020: 10 EE 2C E0 08 C6 2D 1E   A5 25 5D D9 89 C9 F2 21  ..,...-..%]....!
#     0030: 81 C9 15 7C F7 FD 9B A6   B0 EB 23 BD 2A 30 F6 83  ..........#.*0..
#     0040: D0 A6 03 DC EC 14 FB AD   3B 10 BC 4A DA D8 D1 CA  ........;..J....
#     0050: 6E E0 1F 53 84 41 9A C5   35 AA E5 0F 9F 88 28 1F  n..S.A..5.....(.
#     0060: 18 02 BF 46 54 52 6C 00   02 95 CB 00 8C 37 F3 E3  ...FTRl......7..
#     0070: 54 39 DF A2 5C FA 55 31   35 A0 FA 95 32 32 6F 1B  T9..\.U15...22o.
#     0080: 49 AD 65 6F B6 C7 13 78   EB 40 C3 E3 2E C1 72 4B  I.eo...x.@....rK
#     0090: 31 D4 B4 C7 89 E8 52 BC   AE 34 9A EE 0B 38 DB 86  1.....R..4...8..
#     00A0: BB 5B 62 9B 86 60 16 F5   57 1E A9 AA 5F B4 AD A0  .[b..`..W..._...
#     00B0: 10 B5 D6 46 F3 F0 EE 86   4F 6A 5E 5A 23 CF 87 50  ...F....Oj^Z#..P
#     00C0: 46 E0 D4 54 5F 0C 90 5B   CC 82 3F 47 52 44 52 F9  F..T_..[..?GRDR.
#     00D0: 02 46 A2 B1 D0 E5 EB 62   15 98 8A A6 D4 94 2A EE  .F.....b......*.
#     00E0: 41 21 F0 A8 0C 43 27 7D   B7 23 1F D1 42 6C 90 AC  A!...C'..#..Bl..
#     00F0: B8 1A DA B6 C9 2E B3 54   BB 72 3D A9 DA 6C 8E 8A  .......T.r=..l..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.428 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 79 17 4F 12 BC 7B 42 C5   DD 57 1C F9 2C 7B CD 4F  y.O...B..W..,..O
#     0010: 49 E5 8E 74 99 2B 95 4F   EE 97 7C BB 4F E8 D2 87  I..t.+.O....O...
#     0020: 45 FE 5B 7A 4E A7 BE 09   EF BF 2A 3D 21 AB 7E CA  E.[zN.....*=!...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.430 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:21:57.431 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.432 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.444 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 BB 0D 3C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:41.000 UTC",
#       "not  after"         : "2024-01-23 18:21:41.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#           0010: FA 54 1B A6                                        .T..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 2E 9A 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:34.000 UTC",
#       "not  after"         : "2024-01-23 18:21:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.527 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.527 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 74 4D 72 41 D1 E7 5A F3   F9 02 5B CF 69 25 37 63  tMrA..Z...[.i%7c
#     0010: B8 F9 57 A8 A2 1F D2 68   1E FE BD 7B A7 D8 F3 43  ..W....h.......C
#     0020: 73 C4 2F 77 79 F8 AE 27   E2 15 0B 1B 48 40 AD 13  s./wy..'....H@..
#     0030: 1B 77 10 00 DA 4D 82 02   F4 7E 79 B2 63 6B 92 5A  .w...M....y.ck.Z
#     0040: F1 58 79 E2 53 7E 36 DB   E6 53 89 94 6E 06 C4 FF  .Xy.S.6..S..n...
#     0050: 1E 06 A1 2B 76 8C 32 4C   F1 03 52 72 0B 1B 8A EF  ...+v.2L..Rr....
#     0060: 96 E7 47 A9 83 04 39 30   33 3E E5 48 A1 F9 34 31  ..G...903>.H..41
#     0070: D2 C4 02 43 46 D2 6F F7   83 6B BE DC C0 30 2F 8C  ...CF.o..k...0/.
#     0080: 24 B8 E9 FA 71 83 DF 20   CE 4E 4F F3 DE 4C 4B 5A  $...q.. .NO..LKZ
#     0090: 38 EA A9 FD 92 8E 6C 88   A9 49 61 F0 6C 2C C7 FA  8.....l..Ia.l,..
#     00A0: 25 4B B8 3E 91 77 02 64   61 C9 D1 E8 E0 E9 9D A8  %K.>.w.da.......
#     00B0: F6 81 E5 E6 33 BD 3F A8   28 2B 0D 6F 2C 5C C3 12  ....3.?.(+.o,\..
#     00C0: 23 F7 1C C9 F2 8A 40 A4   18 CE 21 69 D8 E2 62 EA  #.....@...!i..b.
#     00D0: 6E 53 BB 11 A0 C8 9B 3A   9F 49 D8 4E 54 31 FF FB  nS.....:.I.NT1..
#     00E0: F9 EE 6C 66 D3 3B 63 2F   26 51 51 97 38 E5 9E D6  ..lf.;c/&QQ.8...
#     00F0: E0 7A 94 4F 7E 26 DC 0B   04 83 06 51 FA D6 3A 39  .z.O.&.....Q..:9
#   }
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.528 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.528 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:21:57.528 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.529 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 91 85 44 F4 8E E1 73 F7   C3 CE C5 05 53 E3 92 DA  ..D...s.....S...
#     0010: BB 2F 2D 7C BC 99 DA 23   EC CD AF 70 BD E5 0A AA  ./-....#...p....
#     0020: 7E A2 58 AB 9C AD EF 09   95 60 66 73 57 97 FE 6B  ..X......`fsW..k
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.529 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:21:57.624 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "21 42 09 80 A8 06 13 1A 22 09 D7 B5 DD 6F 49 E7 78 31 E7 C6 81 01 42 7A 84 2B 4A 21 4F 7D A2 99",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 18:21:58.263 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 18:21:58.264 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-25 18:21:59.797; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 18:21:59.802; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 18:22:00.174; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:22:00.176; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 18:22:00.177; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-vHw9CF/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:00.212 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "46 BB 0D 3C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:41.000 UTC",
#     "not  after"         : "2024-01-23 18:21:41.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#         0010: FA 54 1B A6                                        .T..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:00.216 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2F 4C AB AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:32.000 UTC",
#     "not  after"         : "2024-01-23 18:21:32.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:00.228 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:00.395 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.396 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:00.399 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:00.399 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.404 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.415 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:00.418 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EE 64 AE 69 E7 A7 E5 97 F3 B8 89 EA 6F 15 2B 98 6B D2 80 75 25 26 2C 43 2E EF 90 3E 07 FA EA BF",
#   "session id"          : "2A 65 8D 92 87 11 A2 AB 6D 11 AE 36 56 D3 62 44 86 5C C8 11 C2 BB 87 FA 2A F1 9E 4B C4 26 B3 73",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D9 C9 B2 D8 1E 67 4C BC   60 BD 63 F3 F5 30 8A B4  .....gL.`.c..0..
#             0010: 77 4B 9B AA B3 A2 DC 27   B5 DF 5D 99 BC 20 E8 76  wK.....'..].. .v
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.520 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "7B 40 39 87 CB 63 D4 31 0D 47 9F 70 58 E3 D4 7C 97 2D 4F 31 D4 36 11 2C 7A 36 F0 0C 54 D7 A2 23",
#   "session id"          : "2A 65 8D 92 87 11 A2 AB 6D 11 AE 36 56 D3 62 44 86 5C C8 11 C2 BB 87 FA 2A F1 9E 4B C4 26 B3 73",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C9 4E AE A2 53 92 B9 EF   CE 3E B9 C1 FB 36 78 2A  .N..S....>...6x*
#           0010: 36 82 26 87 EE 5F FB 43   7E 7A A5 3D 9F 46 FE 7C  6.&.._.C.z.=.F..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.521 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.521 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.521 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.522 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.524 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.528 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.529 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.529 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.549 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.551 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.553 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.558 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.567 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.572 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.572 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.572 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.576 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "19 22 71 0F",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:37.000 UTC",
#       "not  after"         : "2024-01-23 18:21:37.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 1B 4B B5 54 BE C8 0F   4A AD E2 ED C8 07 82 7C  W.K.T...J.......
#           0010: 1E B2 5D FA                                        ..].
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.576 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.635 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 2E 9A 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 18:21:34.000 UTC",
#     "not  after"         : "2024-01-23 18:21:34.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#         0010: 26 37 FD FB                                        &7..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#         0010: BE D2 50 41                                        ..PA
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.639 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 01 03 69 39 AB 00 17 C9   67 B0 35 23 A8 45 B5 0F  ..i9....g.5#.E..
#     0010: A5 EC 2E 36 8C C9 33 17   AE 96 3C 9E A4 2E 46 7C  ...6..3...<...F.
#     0020: 58 8F E0 5C FD 23 15 1E   54 E6 87 50 EE B6 53 0A  X..\.#..T..P..S.
#     0030: 62 E6 1C F1 D8 B9 B0 36   A9 38 01 F3 44 F5 F2 02  b......6.8..D...
#     0040: 11 38 E3 06 AA AC E5 4F   4E E3 D7 FB 96 CE 25 30  .8.....ON.....%0
#     0050: 3B 88 3E A6 D4 B9 F4 AF   19 02 9D 34 96 1C 7A 15  ;.>........4..z.
#     0060: 2A 98 63 01 3B B7 8B 6A   19 E3 2C 51 B6 77 50 4F  *.c.;..j..,Q.wPO
#     0070: 67 E7 29 43 2B D4 EA 19   DE A6 FE B2 D9 6E F1 57  g.)C+........n.W
#     0080: 9B 26 8F 05 54 09 A6 C1   20 60 66 E7 40 74 36 5A  .&..T... `f.@t6Z
#     0090: 05 1E 8B 87 02 99 91 1C   70 BF BB 4B FA C3 7B 9B  ........p..K....
#     00A0: 39 54 3C 9F 89 D4 5C 7E   82 E3 A1 FB 6B EF 0C E8  9T<...\.....k...
#     00B0: 3E 37 AE BB F3 B7 9C EF   F7 05 AB FD CE 16 52 28  >7............R(
#     00C0: CE C2 FD 92 6C 56 93 42   A5 7F 88 3B 74 23 2E CD  ....lV.B...;t#..
#     00D0: 57 37 18 78 96 21 FC 87   BC 5E D8 78 EE 1E 1B 7B  W7.x.!...^.x....
#     00E0: 72 86 5F 2A 93 7E 78 DA   C1 A5 90 9E F1 3A 0A 14  r._*..x......:..
#     00F0: BA 34 96 D1 AD FE 3C 2C   B6 60 75 5B 91 8A 05 10  .4....<,.`u[....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.641 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: DF AC 03 A8 6C FB 7D FC   AB B0 53 3A AC 2F E4 81  ....l.....S:./..
#     0010: AD 5C C9 28 89 A9 0A 80   06 9B 27 94 48 B8 B2 05  .\.(......'.H...
#     0020: 43 55 B0 0A 38 14 1E CB   29 3A C1 63 82 4D D6 AD  CU..8...):.c.M..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.642 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:22:00.643 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.643 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.644 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.646 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "46 BB 0D 3C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:41.000 UTC",
#       "not  after"         : "2024-01-23 18:21:41.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E6 1D 32 C5 BA 4E D8 38   79 BA 4E DE 52 3D A8 2F  ..2..N.8y.N.R=./
#           0010: FA 54 1B A6                                        .T..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 2E 9A 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:34.000 UTC",
#       "not  after"         : "2024-01-23 18:21:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.668 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 76 A8 2A 21 86 6D D0 4B   DE 9B 45 8A 27 59 8C E9  v.*!.m.K..E.'Y..
#     0010: AC DC 22 98 A6 EA 15 00   50 8E 64 2B 1C 78 49 CA  ..".....P.d+.xI.
#     0020: C6 85 D2 12 39 76 3B 24   C9 72 D0 FB 83 AF C9 AB  ....9v;$.r......
#     0030: E4 4F 07 AB ED EE EA D9   05 F0 E5 39 15 E7 2A 65  .O.........9..*e
#     0040: EE DF EC 6C EA 5C 01 BC   25 3C 07 9E 6E E7 6F 23  ...l.\..%<..n.o#
#     0050: 10 5E 77 22 48 FA 18 3A   F1 26 0F 7D A4 13 D9 F8  .^w"H..:.&......
#     0060: 95 11 8C D2 8C 4C 23 14   5E 0B F9 C2 99 F9 FC 87  .....L#.^.......
#     0070: 8D C3 D6 6A D6 B9 B4 59   24 43 B7 1C 81 8C C1 3B  ...j...Y$C.....;
#     0080: 73 15 37 5E 15 6D 95 F3   14 3B 11 9E 13 3E 73 16  s.7^.m...;...>s.
#     0090: 38 59 61 F7 4F CB 0F 8E   E1 39 F7 62 D9 B2 48 01  8Ya.O....9.b..H.
#     00A0: C1 E7 57 04 E7 51 A0 BD   C4 5E A2 B0 E1 9B 85 4E  ..W..Q...^.....N
#     00B0: 64 7A 24 45 AC 28 7E 27   00 E6 E9 3E AD 62 02 68  dz$E.(.'...>.b.h
#     00C0: E7 6A 76 F4 8D 4D D4 5A   EB 40 BD DA D5 57 01 19  .jv..M.Z.@...W..
#     00D0: A0 43 29 F4 6E 48 B0 A3   53 42 CF B2 4B BF 85 36  .C).nH..SB..K..6
#     00E0: 59 75 0D 06 21 68 38 AB   2C F2 9B 43 A5 0B C5 A0  Yu..!h8.,..C....
#     00F0: CC 43 2B B3 17 65 18 84   59 A0 DF CB FA 01 00 3A  .C+..e..Y......:
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.670 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: F8 D5 59 42 0E 95 C6 E5   11 3C AD B4 C5 5B 78 21  ..YB.....<...[x!
#     0010: 12 2E 2F BF C6 12 46 70   0D CB F3 8F 74 EA 03 83  ../...Fp....t...
#     0020: 34 B3 F7 71 4C E8 C8 3B   38 B4 4C A7 D5 D4 3D B8  4..qL..;8.L...=.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.670 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.756 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.757 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.757 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 18:22:00.757 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:00.758 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "4E 70 2F D9 30 2D E8 F6 47 3F 5D 36 F6 5F CD D6 BB 29 1C 49 82 2F 4C AF C7 2B 2D 11 81 4B 3B 93",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 18:22:01.179 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 18:22:01.180 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-25 18:22:14.237; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:14.606 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2F 4C AB AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:32.000 UTC",
#       "not  after"         : "2024-01-23 18:21:32.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 2E 9A 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 18:21:34.000 UTC",
#       "not  after"         : "2024-01-23 18:21:34.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 1D CC 32 C7 F5 A5 E4 39   FB DA B6 FA 2F 14 2E 87  ..2....9..../...
#           0010: 26 37 FD FB                                        &7..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6B 98 29 0C BA 2C 81 E5   2B 93 68 1F 79 DD BA 32  k.)..,..+.h.y..2
#           0010: BE D2 50 41                                        ..PA
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-25 18:22:14.619 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:15.150 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.150 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:15.152 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 18:22:15.152 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.156 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.166 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.167 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.167 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 18:22:15.169 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "44 3A 41 10 E5 FC 32 73 FE 1A C4 9B EA BB 2F 73 E6 75 03 F2 C8 07 8E 8F B6 7E D2 01 EF 9C BB 5B",
#     "session id"          : "7F A8 02 2F 73 73 85 FF F9 53 CC 7F 4D C7 BC 86 A4 BB BD A4 2D E7 1E DD 54 43 47 B4 68 28 4B 23",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A5 E5 6F 71 6B C9 3E 11   75 CD 80 45 2B F8 B4 7D  ..oqk.>.u..E+...
#               0010: 7D 36 32 96 54 06 CF 71   2B E9 F3 85 0D EF 4A 50  .62.T..q+.....JP
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C2 D7 8C C9 12 37 9B F7 D2 C9 C3 5D A3 39 A3 F2 A9 2C 48 A1 8B A8 CE 5E 14 12 EE CB 8D 61 0F 67",
#     "session id"          : "7F A8 02 2F 73 73 85 FF F9 53 CC 7F 4D C7 BC 86 A4 BB BD A4 2D E7 1E DD 54 43 47 B4 68 28 4B 23",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 10 79 03 7B 87 CF EE   01 13 CF AF 0C D0 F3 88  D.y.............
#             0010: EE 50 CB DD 85 30 A3 B1   95 4A 8B 0D 3B 61 59 33  .P...0...J..;aY3
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.184 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.186 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.189 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.190 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.191 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.200 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.202 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.205 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.210 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
#   "CertificateRequest": {
#     "certificate_request_context": "",
#     "extensions": [
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#       },
#       "certificate_authorities (47)": {
#         "certificate authorities": [
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#           CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.212 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.213 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 18:22:15.213 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:22:15.213 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificat

[...truncated too long message...]

ty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
#   	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
#   	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 18:23:32.655 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:43586/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14409ms
ok 78 stop command for single port in 17752ms
ok 79 status detects locally running solr in 9341ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7522ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1095ms
ok 82 listing out files in 2881ms
ok 83 copying files around in 6561ms
ok 84 upconfig in 2554ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1251ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1242ms
ok 87 Cleanup in 2077ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 7m 4s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3lv2fewxtke4q

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8244 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8244/

1 tests failed.
FAILED:  org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget

Error Message:
java.lang.AssertionError: The non-source node '127.0.0.1:46587_solr' has the wrong number of replicas after the migration expected:<2> but was:<3>

Stack Trace:
java.lang.AssertionError: The non-source node '127.0.0.1:46587_solr' has the wrong number of replicas after the migration expected:<2> but was:<3>
	at __randomizedtesting.SeedInfo.seed([9A3018CA9339638A:B45BCCF0A65AB2FE]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget(MigrateReplicasTest.java:303)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 4133 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:32885/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-25 12:54:27.654; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:54:27.658; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:32885/solr] to [https://127.0.0.1:32885].
# WARN  - 2023-10-25 12:54:28.514; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-25 12:54:28.552; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16965ms
ok 74 start solr with client truststore and security manager in 19748ms
not ok 75 start solr with mTLS needed in 50740ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-O1u2aT/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 32885 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 32885 (pid=3409191). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 32886 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 32886 (pid=3409316). Happy searching!
#
#     INFO  - 2023-10-25 12:55:29.615; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:55:29.635; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 12:55:30.465; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:30.467; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@119f1f2a(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:30.470; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(ca,h=[localhost],a=[],w=[]) for Client@5dbe30be[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:30.542 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9E 6F EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:17.000 UTC",
#     "not  after"         : "2024-01-23 12:55:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#         0010: D5 86 BD 09                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:30.546 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 26 F0 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:08.000 UTC",
#     "not  after"         : "2024-01-23 12:55:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:30.581 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:31.518 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.519 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:31.523 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:31.524 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.531 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.544 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.544 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.550 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:31.552 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7B AF E4 4E 62 C9 96 F6 0F 53 16 44 13 D7 C8 AD 8F C3 73 92 BD 66 81 2C 92 79 7A E6 A9 DB 9A 38",
#   "session id"          : "3A 9A C6 B4 ED 7E 7F 85 05 3E 1C A4 72 97 8D 16 A7 27 4F C2 97 B8 36 8D 71 AD 05 09 A3 95 58 CE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B7 3D 67 13 5F 11 57 F5   B0 DB E8 52 7D 6F F1 9C  .=g._.W....R.o..
#             0010: 64 30 07 4C 65 60 69 1E   07 52 64 BE 97 78 70 38  d0.Le`i..Rd..xp8
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.745 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4E 49 16 C7 10 17 BA 12 2A E9 7C A4 F7 8E FC 4D EF DD AC 9D D1 2B 82 23 C1 60 CC D2 D6 5B 1C 77",
#   "session id"          : "3A 9A C6 B4 ED 7E 7F 85 05 3E 1C A4 72 97 8D 16 A7 27 4F C2 97 B8 36 8D 71 AD 05 09 A3 95 58 CE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 45 30 79 07 ED 7C CC A1   FA F4 58 B7 6F 18 B4 18  E0y.......X.o...
#           0010: EB D6 02 09 F3 89 1B 6F   E6 38 4E D9 A6 13 F7 3D  .......o.8N....=
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.745 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.746 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.751 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.756 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.758 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.768 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.768 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.769 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.769 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.769 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.770 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.808 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.810 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.811 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.834 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.834 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.834 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.835 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.842 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.842 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.842 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.844 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.852 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.853 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.853 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.865 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 82 49 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:13.000 UTC",
#       "not  after"         : "2024-01-23 12:55:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 8A 18 F3 43 28 C4 46   F5 03 E2 CC 5A 31 F6 BE  :...C(.F....Z1..
#           0010: 73 18 AF 03                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.865 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.967 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.977 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 65 69 C7 3A 6B 34 87   7C 8B C3 33 02 A1 08 5D  .ei.:k4....3...]
#     0010: 55 B3 3D 33 8F 5F 9F 27   EA FE A0 BE 84 C8 2E D7  U.=3._.'........
#     0020: 1F 63 00 D0 32 C0 CB CD   5E 9D 1D ED E5 15 79 97  .c..2...^.....y.
#     0030: C3 32 91 49 94 97 2D B1   41 7B 11 C7 AD F5 4A 6F  .2.I..-.A.....Jo
#     0040: C9 6B 5C 06 18 E1 0E 47   A7 13 A2 F0 68 87 55 09  .k\....G....h.U.
#     0050: 74 FF 93 26 17 2F 52 FA   69 01 A3 23 29 6B 2B FF  t..&./R.i..#)k+.
#     0060: 19 76 0E B4 06 7C 57 96   6B 9E C5 38 6B 87 74 40  .v....W.k..8k.t@
#     0070: 27 3D 39 FE B9 1B F0 D2   6A 3B B4 C9 D5 1B DB 80  '=9.....j;......
#     0080: 07 F4 1D B2 CA E7 12 19   4F 23 4C D1 86 44 36 CE  ........O#L..D6.
#     0090: 25 7E 65 63 FC D4 7B 24   E8 19 EB AE 00 9D A0 E0  %.ec...$........
#     00A0: AC D8 54 5D B8 1F 07 DA   D6 E7 6F 49 A5 9D DC 1A  ..T]......oI....
#     00B0: D5 96 F1 5D AA EF 72 F2   D8 74 07 8B 36 0E 8D 65  ...]..r..t..6..e
#     00C0: BD 75 53 7B 55 D7 47 A2   88 89 EF C6 57 11 53 40  .uS.U.G.....W.S@
#     00D0: 6C BA E3 6A 9A AA 25 04   7B E1 05 88 16 24 72 92  l..j..%......$r.
#     00E0: 61 92 EE 6B DD D5 22 54   85 04 D0 F3 EC EB 87 36  a..k.."T.......6
#     00F0: 1A 8C CE 1B 71 29 09 24   66 2E 2B 46 7C F3 F1 E8  ....q).$f.+F....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.978 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A7 90 29 17 0F 4E 7F 04   4A 69 D9 3B 12 39 62 77  ..)..N..Ji.;.9bw
#     0010: DE 2A 89 92 50 DC A6 8B   09 EA 76 6F DF 32 01 FB  .*..P.....vo.2..
#     0020: 05 83 A3 2F 5D B1 80 71   62 7D 9F E1 75 F8 43 B5  .../]..qb...u.C.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.981 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.982 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:31.988 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 9E 6F EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:17.000 UTC",
#       "not  after"         : "2024-01-23 12:55:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#           0010: D5 86 BD 09                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 E3 82 E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:10.000 UTC",
#       "not  after"         : "2024-01-23 12:55:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.042 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 19 71 77 2D D3 9E A4 9A   CD 58 DB 63 F0 F7 61 1F  .qw-.....X.c..a.
#     0010: 7E 42 F3 CE A3 77 BB 74   24 E9 79 BA FE F1 FB 36  .B...w.t$.y....6
#     0020: 16 AB 87 05 B9 33 C4 F3   34 A0 73 DE 6C 6A 74 6D  .....3..4.s.ljtm
#     0030: E5 40 8B 2E 91 8A C5 D4   28 CD B7 BF 0F F2 71 3F  .@......(.....q?
#     0040: 8F CD 64 56 69 78 74 3E   80 33 B4 91 B7 38 B5 49  ..dVixt>.3...8.I
#     0050: B5 36 D6 B7 66 82 02 C4   CA 88 3B A6 BE A8 89 64  .6..f.....;....d
#     0060: 84 4A 54 2B EC 5E C2 C0   34 AF A2 57 45 9C 5B B1  .JT+.^..4..WE.[.
#     0070: 02 56 5B 02 A3 73 A5 D7   37 0F 95 7E 4E F8 F1 93  .V[..s..7...N...
#     0080: 94 1C 19 EA 55 62 0F 5E   54 AC 97 37 E6 15 57 59  ....Ub.^T..7..WY
#     0090: F9 49 4E DA F9 77 C9 8A   00 0E 96 E9 AC 6E C8 B6  .IN..w.......n..
#     00A0: 16 0B 16 36 D8 21 9C 87   C9 FE 4C 35 FB 45 76 56  ...6.!....L5.EvV
#     00B0: F4 16 24 5C 03 59 F4 38   94 BA EF D7 65 5A FF A1  ..$\.Y.8....eZ..
#     00C0: 14 B5 9A 85 01 EE BD A6   3E 8B 57 91 19 8E DD 79  ........>.W....y
#     00D0: 3B 42 FD 3D 69 1E 95 3E   F3 C5 E2 7A C8 23 5E C8  ;B.=i..>...z.#^.
#     00E0: 2A 9A AE 91 08 BC 96 38   51 0A 1A 10 F3 26 1B D6  *......8Q....&..
#     00F0: 4E 6A A4 24 8A 41 BD 2E   38 16 D6 B9 E6 43 02 02  Nj.$.A..8....C..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.052 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D0 0C F2 D2 AC FF 61 BE   D6 88 26 3D 4F 3E DE 93  ......a...&=O>..
#     0010: 83 EE A0 FB F2 01 38 3A   F7 7B CC 12 3F 03 0D 0D  ......8:....?...
#     0020: F5 47 AF C4 10 29 83 21   53 07 09 45 87 62 59 03  .G...).!S..E.bY.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.052 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:32.146 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "98 0C 17 65 12 AF 9B 38 38 72 48 51 B2 BE 45 D1 24 E2 C4 3E F4 B9 22 DC 6D E2 31 4B B0 B1 BD 53",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 12:55:33.028 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 12:55:33.029 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-25 12:55:34.814; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-25 12:55:34.819; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-25 12:55:35.231; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:35.233; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-25 12:55:35.234; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-O1u2aT/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:35.270 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7D 9E 6F EF",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:17.000 UTC",
#     "not  after"         : "2024-01-23 12:55:17.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#         0010: D5 86 BD 09                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:35.274 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5E 26 F0 0A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:08.000 UTC",
#     "not  after"         : "2024-01-23 12:55:08.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:35.286 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:35.461 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.461 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:35.463 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:35.463 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.467 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.480 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.480 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.480 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:35.482 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "6D CF 58 6B AF E1 BC 0B 3F 90 17 E0 59 22 7A 91 68 04 7A 23 9F 70 61 45 36 BA 45 4B 16 9E FD 90",
#   "session id"          : "5B 37 E8 46 95 E4 24 27 0B 7F B6 9D C7 85 8A 9F 06 FA 60 7A 99 58 A3 A1 43 C4 8C 1B 9D 16 D7 B4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A7 12 B3 FF C6 AB D5 B4   00 9D 84 13 F1 9C 4A DE  ..............J.
#             0010: 5F 3E 60 8E 69 0E 98 8C   BC 77 64 17 52 0A 4B 69  _>`.i....wd.R.Ki
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.600 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "47 31 46 73 0D 18 39 E0 17 CF BB D8 37 FE 87 BE 3F 24 A3 F6 86 E1 FE F8 D5 B1 5E A2 2B 18 CC DE",
#   "session id"          : "5B 37 E8 46 95 E4 24 27 0B 7F B6 9D C7 85 8A 9F 06 FA 60 7A 99 58 A3 A1 43 C4 8C 1B 9D 16 D7 B4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A2 B9 03 F1 1D F0 78 7E   9D 80 C8 C0 A8 F3 A5 F1  ......x.........
#           0010: 94 CF 2C C6 C8 4E B5 93   49 7C C6 BE E6 BF D4 60  ..,..N..I......`
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.600 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.600 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.601 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.603 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.604 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.612 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.613 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.620 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.625 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.625 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.626 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.627 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.628 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.628 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.640 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1C 82 49 83",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:13.000 UTC",
#       "not  after"         : "2024-01-23 12:55:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A 8A 18 F3 43 28 C4 46   F5 03 E2 CC 5A 31 F6 BE  :...C(.F....Z1..
#           0010: 73 18 AF 03                                        s...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.641 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.713 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "24 E3 82 E8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-25 12:55:10.000 UTC",
#     "not  after"         : "2024-01-23 12:55:10.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#         0010: 31 6F 4E F3                                        1oN.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#         0010: 9B FC 7C 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.719 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4D FA 54 A3 57 10 C8 6C   30 1D 4E 62 B3 81 05 94  M.T.W..l0.Nb....
#     0010: EE F9 3C 75 08 F0 DC 51   4C 56 DF 3B 8D AD 31 72  ..<u...QLV.;..1r
#     0020: DC 85 CC 67 F6 69 61 80   DC 5C D0 A8 5A 5A E9 6F  ...g.ia..\..ZZ.o
#     0030: 24 F6 F6 07 D4 AA F5 A3   48 D3 75 A0 B8 4D 12 33  $.......H.u..M.3
#     0040: 9A 41 66 0F 26 43 CB 6C   B5 3B 53 7A B4 80 65 44  .Af.&C.l.;Sz..eD
#     0050: 73 68 81 15 08 24 7F 48   46 7A C9 BC F6 9C B3 96  sh...$.HFz......
#     0060: EE 22 E6 8F 82 F7 65 9D   8F B7 0C 85 FF 66 A6 80  ."....e......f..
#     0070: 0D 14 DF 95 C9 62 09 4D   D9 82 6D BA 29 52 FB 46  .....b.M..m.)R.F
#     0080: DB F2 29 8E 99 57 D0 BC   01 6D 0A 81 BB 8A 51 D8  ..)..W...m....Q.
#     0090: 9E 61 FB 61 D5 4C A9 58   EC 08 20 3A 20 3D C5 CC  .a.a.L.X.. : =..
#     00A0: 16 DE 6B E1 BB 48 73 8E   0F C4 E8 97 2E 91 7E 38  ..k..Hs........8
#     00B0: 43 80 12 50 B5 AC DC 67   D8 0C EB D2 AB F3 D7 BC  C..P...g........
#     00C0: CB C8 3F 5F 49 44 A4 28   9B 26 A8 17 5B 08 42 33  ..?_ID.(.&..[.B3
#     00D0: 3D 17 B7 69 3B 8E 5E 4E   F9 F0 36 73 DD F1 67 AB  =..i;.^N..6s..g.
#     00E0: F5 3B 39 C7 24 E9 22 43   17 CC DE E5 71 4C BC CA  .;9.$."C....qL..
#     00F0: BA 3A EA 1F 59 71 D6 98   1A 70 BF DC D4 9B 7C EC  .:..Yq...p......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.721 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0D 0D 5B 88 6E E6 2D 01   46 D9 70 82 F3 D0 E7 1D  ..[.n.-.F.p.....
#     0010: 21 82 92 EC 2D 8E 97 7D   87 1B 8A AC 4F 16 25 85  !...-.......O.%.
#     0020: F5 E3 97 F4 0E 19 A0 F9   04 D5 EA 1D 22 20 40 3B  ............" @;
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.722 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:35.723 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.723 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:35.723 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.724 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.726 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7D 9E 6F EF",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:17.000 UTC",
#       "not  after"         : "2024-01-23 12:55:17.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 57 26 AB C9 92 91 38 8E   05 30 2E 2D 06 5F 05 5B  W&....8..0.-._.[
#           0010: D5 86 BD 09                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 E3 82 E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:10.000 UTC",
#       "not  after"         : "2024-01-23 12:55:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.754 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 6B F4 9E 87 E3 F0 0F   F1 36 F8 F8 B7 07 91 08  wk.......6......
#     0010: D2 5E EC 9D B3 E2 33 6A   BA 7F 89 EB 6A 43 18 C8  .^....3j....jC..
#     0020: D7 39 5C 76 B5 F5 47 85   C3 1F 06 03 E4 EC 88 5D  .9\v..G........]
#     0030: A2 2F BD 49 16 8D E8 06   5B 72 1F 83 E3 1E 10 B3  ./.I....[r......
#     0040: B5 E2 72 60 06 56 D1 39   38 01 4D C3 4D E7 5D 68  ..r`.V.98.M.M.]h
#     0050: 97 02 FC FD 6D 86 45 6D   6B 68 B0 C4 21 23 79 80  ....m.Emkh..!#y.
#     0060: 9E 44 43 97 18 80 C1 C4   2F D7 B2 AD 53 B1 9D 04  .DC...../...S...
#     0070: 2A A3 0D D0 91 7C 73 9C   A5 CE BA 6B DA 6C 4C D0  *.....s....k.lL.
#     0080: 8E E9 FE 2F 45 88 FA 8E   DE B0 F8 01 38 9F 78 04  .../E.......8.x.
#     0090: A8 B0 E1 94 90 27 D7 2B   EC B7 BD 6F 1A 59 CE 8C  .....'.+...o.Y..
#     00A0: 52 2D D0 56 79 4C 1F 05   42 1F 5B DC 11 DB 9C 7C  R-.VyL..B.[.....
#     00B0: 74 43 BF 30 B5 5F 19 FD   2F B8 89 CA 5D A3 67 76  tC.0._../...].gv
#     00C0: 8F 5C EC 2A 38 4F 6D 28   C4 02 14 F8 F2 50 67 20  .\.*8Om(.....Pg
#     00D0: 81 93 ED FD 40 F0 16 55   E0 2B 41 B6 93 8E 70 BE  ....@..U.+A...p.
#     00E0: 6D AD 20 BC B0 15 5B C9   3F 07 62 5B 62 8A 00 5C  m. ...[.?.b[b..\
#     00F0: CC E8 45 62 6B B0 C2 A2   40 B8 D7 2B A6 2B AD 46  ..Ebk...@..+.+.F
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.755 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 06 76 5C FA 2B 18 C8 29   4B 8D 6B 7F EE 3C 2B EB  .v\.+..)K.k..<+.
#     0010: ED 0E 9E 93 B9 AF 10 8D   B7 B8 66 73 5B 14 67 14  ..........fs[.g.
#     0020: F1 08 34 34 6C A8 59 D2   9E A5 CA 15 6D 4B 13 DC  ..44l.Y.....mK..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.756 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.776 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.776 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.776 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:55:35.777 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:35.822 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "74 24 AC 3E D6 EF 95 D0 D2 BA 4E E3 4A 73 61 DA 27 9B 67 53 D5 31 6E BF C5 46 36 EE EB 0E 6F 13",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-25 12:55:36.137 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-25 12:55:36.138 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-25 12:55:49.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:49.447 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5E 26 F0 0A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:08.000 UTC",
#       "not  after"         : "2024-01-23 12:55:08.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "24 E3 82 E8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-25 12:55:10.000 UTC",
#       "not  after"         : "2024-01-23 12:55:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 D5 33 B5 B5 56 24 F6   CC B2 DC 04 38 30 92 01  A.3..V$.....80..
#           0010: 31 6F 4E F3                                        1oN.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AE B9 9D 9B A0 F5 19 D0   B1 74 B3 F6 D5 E5 15 96  .........t......
#           0010: 9B FC 7C 99                                        ....
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-25 12:55:49.515 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:49.718 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.718 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:49.720 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-25 12:55:49.720 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.724 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.735 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.735 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.735 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-25 12:55:49.737 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "18 43 B8 DF AF 54 96 27 C6 73 15 6D 40 62 4A A0 28 00 A8 F9 7B 41 89 A1 D7 9C A9 91 59 BB FB BE",
#     "session id"          : "B5 1F D2 AD F1 1A F5 1D 60 50 41 1E 30 80 CA 7E 72 37 B1 C7 84 C2 E5 CF D6 85 A7 06 0E 03 8D 6A",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4C 78 2F 11 83 FC B9 53   EF B4 AF BB 22 D2 AB C5  Lx/....S...."...
#               0010: 71 74 C0 7F F7 B2 92 9E   13 42 D1 1D 03 AA 3C 43  qt.......B....<C
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.755 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "66 8B 39 96 7D 18 C6 59 75 5E 79 3F 3A F9 3E 1E B1 DD D5 EC 32 E2 B7 77 1C C2 B1 E1 94 B3 7C E8",
#     "session id"          : "B5 1F D2 AD F1 1A F5 1D 60 50 41 1E 30 80 CA 7E 72 37 B1 C7 84 C2 E5 CF D6 85 A7 06 0E 03 8D 6A",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9C 58 A9 6F 66 5C 3C BC   98 76 7C D6 96 6E 82 CE  .X.of\<..v...n..
#             0010: 24 B2 B1 08 19 E9 74 80   FB 09 16 24 12 84 E3 38  $.....t....$...8
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.755 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.755 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.756 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.757 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.758 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.758 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.758 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-25 12:55:49.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:55:49.760 UTC|SS

[...truncated too long message...]

cutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-25 12:57:02.433 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.475 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.476 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.476 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-25 12:57:02.476 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:32886/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:550)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14639ms
ok 78 stop command for single port in 18385ms
ok 79 status detects locally running solr in 9683ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7494ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1092ms
ok 82 listing out files in 3034ms
ok 83 copying files around in 6573ms
ok 84 upconfig in 2632ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1255ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1239ms
ok 87 Cleanup in 2107ms

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.MigrateReplicasTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.MigrateReplicasTest.testGoodSpreadDuringAssignWithNoTarget" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=9A3018CA9339638A -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/73svf2ok7acmw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8243 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8243/

All tests passed

Build Log:
[...truncated 1519 lines...]
BUILD FAILED in 1h 5m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/bdkwg4nsmaxrs

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8242 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8242/

All tests passed

Build Log:
[...truncated 1493 lines...]
BUILD FAILED in 1h 5m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/fzxrsupd7fppu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8241 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8241/

All tests passed

Build Log:
[...truncated 1414 lines...]
BUILD FAILED in 1h 5m 26s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7yw2sobcvxisi

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8240 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8240/

All tests passed

Build Log:
[...truncated 1568 lines...]
BUILD FAILED in 1h 6m 3s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/uprod6xs27iuo

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8239 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8239/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([8D7ACC67C69FB847:BAE13879FE5365E3]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.renewDelegationToken(TestDelegationWithHadoopAuth.java:122)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.verifyDelegationTokenRenew(TestDelegationWithHadoopAuth.java:307)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew(TestDelegationWithHadoopAuth.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 2022 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=8D7ACC67C69FB847 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 9s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/a6ukutag3p6ie

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8238 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8238/

All tests passed

Build Log:
[...truncated 1438 lines...]
BUILD FAILED in 1h 5m 1s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/w6pyzygehomfq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8237 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8237/

All tests passed

Build Log:
[...truncated 1443 lines...]
BUILD FAILED in 1h 4m 42s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/6sdseuprn4yjs

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8236 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8236/

All tests passed

Build Log:
[...truncated 1435 lines...]
BUILD FAILED in 1h 5m 51s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3shwx3kssdwj6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8235 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8235/

All tests passed

Build Log:
[...truncated 1449 lines...]
BUILD FAILED in 1h 3m 45s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vrmgz3zyrlkrk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8234 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8234/

1 tests failed.
FAILED:  org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([394CC427F3ECF24C:ED73039CB202FE8]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.renewDelegationToken(TestDelegationWithHadoopAuth.java:122)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.verifyDelegationTokenRenew(TestDelegationWithHadoopAuth.java:307)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew(TestDelegationWithHadoopAuth.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1980 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=394CC427F3ECF24C -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/epgwchjfnbdlg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8233 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8233/

All tests passed

Build Log:
[...truncated 1445 lines...]
BUILD FAILED in 1h 5m 30s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/3bvmmozuozpvm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8232 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8232/

All tests passed

Build Log:
[...truncated 1399 lines...]
BUILD FAILED in 1h 6m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/yugmfbwmr4kcc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8231 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8231/

All tests passed

Build Log:
[...truncated 1458 lines...]
BUILD FAILED in 1h 4m 8s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/uss42e7oadbmq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8230 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8230/

All tests passed

Build Log:
[...truncated 1423 lines...]
BUILD FAILED in 1h 3m 15s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/xqmtwvy4j3epm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8229 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8229/

1 tests failed.
FAILED:  org.apache.solr.search.TestFiltering.testRandomFiltering

Error Message:
java.lang.AssertionError: FAILURE: indexSize=67 iiter=2 qiter=67 request=[q, {!frange v=val_i l=20 u=86 cache=false}, fq, {!frange v=val_i l=7 u=11 cache=true tag=t}, fq, {! cache=true tag=t}id:RAND1679204360 OR val_s:{00028 TO 00059}, fq,  val_i:3 val_i:5 val_i:6 val_i:7 val_i:8 val_i:9 val_i:10 val_i:11 val_i:14 val_i:21 val_i:25 val_i:27 val_i:30 val_i:32 val_i:33 val_i:34 val_i:35 val_i:36 val_i:39 val_i:40 val_i:41 val_i:42 val_i:43 val_i:44 val_i:45 val_i:48 val_i:49 val_i:51 val_i:52 val_i:54 val_i:56 val_i:60 val_i:61 val_i:62, facet, true, facet.query, *:*, facet.query, {!key=multiSelect ex=t}*:*, facet.query, {!key=facetQuery}val_i:[00061 TO 00106] AND val_i:{00060 TO 00107}]

Stack Trace:
java.lang.AssertionError: FAILURE: indexSize=67 iiter=2 qiter=67 request=[q, {!frange v=val_i l=20 u=86 cache=false}, fq, {!frange v=val_i l=7 u=11 cache=true tag=t}, fq, {! cache=true tag=t}id:RAND1679204360 OR val_s:{00028 TO 00059}, fq,  val_i:3 val_i:5 val_i:6 val_i:7 val_i:8 val_i:9 val_i:10 val_i:11 val_i:14 val_i:21 val_i:25 val_i:27 val_i:30 val_i:32 val_i:33 val_i:34 val_i:35 val_i:36 val_i:39 val_i:40 val_i:41 val_i:42 val_i:43 val_i:44 val_i:45 val_i:48 val_i:49 val_i:51 val_i:52 val_i:54 val_i:56 val_i:60 val_i:61 val_i:62, facet, true, facet.query, *:*, facet.query, {!key=multiSelect ex=t}*:*, facet.query, {!key=facetQuery}val_i:[00061 TO 00106] AND val_i:{00060 TO 00107}]
	at __randomizedtesting.SeedInfo.seed([52FBBACC94C7D024:4D98190971E0902D]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.search.TestFiltering.testRandomFiltering(TestFiltering.java:576)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 3041 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.search.TestFiltering.testRandomFiltering (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestFiltering.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestFiltering.testRandomFiltering" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=52FBBACC94C7D024 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 52s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ooqpujx3cz2me

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8228 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8228/

All tests passed

Build Log:
[...truncated 1429 lines...]
BUILD FAILED in 1h 2m 10s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/q3knwsj67rvkk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8227 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8227/

All tests passed

Build Log:
[...truncated 1409 lines...]
BUILD FAILED in 1h 4m 5s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/rxszpphxsjpzg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8226 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8226/

2 tests failed.
FAILED:  org.apache.solr.HelloWorldSolrCloudTestCase.classMethod

Error Message:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).

Stack Trace:
java.lang.Exception: Suite timeout exceeded (>= 7200000 msec).
	at __randomizedtesting.SeedInfo.seed([6B1E8E1597B8FEF6]:0)


FAILED:  org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew

Error Message:
java.lang.AssertionError: expected:<200> but was:<403>

Stack Trace:
java.lang.AssertionError: expected:<200> but was:<403>
	at __randomizedtesting.SeedInfo.seed([6B1E8E1597B8FEF6:5C857A0BAF742352]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:647)
	at org.junit.Assert.assertEquals(Assert.java:633)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.renewDelegationToken(TestDelegationWithHadoopAuth.java:122)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.verifyDelegationTokenRenew(TestDelegationWithHadoopAuth.java:307)
	at org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew(TestDelegationWithHadoopAuth.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 7440 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:35529/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-20 05:35:43.624; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 05:35:43.629; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35529/solr] to [https://127.0.0.1:35529].
# WARN  - 2023-10-20 05:35:44.489; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-20 05:35:44.529; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 18386ms
ok 74 start solr with client truststore and security manager in 20546ms
not ok 75 start solr with mTLS needed in 53346ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-44C8sf/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35529 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35529 (pid=2314723). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35530 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35530 (pid=2314845). Happy searching!
#
#     INFO  - 2023-10-20 05:36:49.829; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 05:36:49.850; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 05:36:50.758; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:50.760; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:50.760; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(ca,h=[localhost],a=[],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:50.802 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 BB BA 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:35.000 UTC",
#     "not  after"         : "2024-01-18 05:36:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#         0010: 05 67 A1 A9                                        .g..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:50.806 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 83 73 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:26.000 UTC",
#     "not  after"         : "2024-01-18 05:36:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:50.820 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.287 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.287 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.287 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:51.288 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:51.375 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.376 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:51.379 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:51.380 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.401 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.429 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.430 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.430 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:51.436 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "1F 8A 53 C5 7A 80 60 A6 28 80 D6 63 98 EE 52 F6 7F 4C 60 56 B1 0D 78 FC AC A8 AE 2C AF 63 A9 B4",
#   "session id"          : "42 74 40 00 C4 90 8C DC 0A D0 D2 B0 86 81 BB 1E 1C C8 DB B2 22 2D AA 53 F4 C4 03 48 C3 70 40 68",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 85 20 5B 1B 53 D4 0A C6   0E 84 1F 3A 80 00 8D CF  . [.S......:....
#             0010: 8C 72 99 4A 01 0D A5 E5   14 E7 5C B2 CC 8B 43 5F  .r.J......\...C_
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.652 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "89 ED 1E 3A 1A 1B 6C FC F6 37 88 FA 94 B2 DB 3C 28 20 08 48 49 CF B5 3F 97 4F 38 60 EE D3 B4 B5",
#   "session id"          : "42 74 40 00 C4 90 8C DC 0A D0 D2 B0 86 81 BB 1E 1C C8 DB B2 22 2D AA 53 F4 C4 03 48 C3 70 40 68",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 47 B0 81 91 4D D8 A6 A5   FF F5 45 2D 4F BE EB E4  G...M.....E-O...
#           0010: 51 F4 C6 56 65 EA 1E 05   DF 8D BA 34 14 DB D9 40  Q..Ve......4...@
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.653 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.653 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.655 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.655 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.656 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.662 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.662 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.662 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.669 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.669 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.671 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.673 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.674 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.675 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.711 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.713 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.718 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.724 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.727 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.727 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.728 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.737 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.737 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.737 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.740 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.749 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.750 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.750 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.758 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 78 03 F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:31.000 UTC",
#       "not  after"         : "2024-01-18 05:36:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 34 B4 36 7D DE 2F 2E   40 3A B6 2A 39 B7 EB C3  .4.6../.@:.*9...
#           0010: 11 D0 02 21                                        ...!
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.759 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.876 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.890 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7C 7C EA 68 A7 09 35 DD   6F D4 DB 2F 97 6D 0E 0D  ...h..5.o../.m..
#     0010: A1 A5 7E 40 14 C6 1D E3   C9 B3 46 45 45 49 CA 8F  ...@......FEEI..
#     0020: 8D 1B 3B D9 92 E2 F9 6D   75 6B F8 76 60 63 F6 88  ..;....muk.v`c..
#     0030: 49 B0 D8 E4 EF 8F 0D D9   01 46 6D 3E BD E9 45 63  I........Fm>..Ec
#     0040: 09 F6 93 AD E1 28 18 4D   10 C1 CA 93 38 62 8F C5  .....(.M....8b..
#     0050: 1C 3A 31 B9 26 4E 17 2E   CA 11 D8 80 E4 13 8A 3F  .:1.&N.........?
#     0060: CA 11 BD 5D 07 8F AE 05   19 6A 5E FF 83 90 F0 DA  ...].....j^.....
#     0070: 28 BC 30 1A D8 EE 02 F0   58 98 30 ED CE 68 21 57  (.0.....X.0..h!W
#     0080: 47 B4 9E D8 53 B0 A2 50   2A 11 F2 9D 66 12 27 6A  G...S..P*...f.'j
#     0090: 68 32 D8 67 A2 0D 92 C4   AF 2B 79 23 6D C7 C5 31  h2.g.....+y#m..1
#     00A0: 13 A6 A9 B8 DB 55 34 26   71 5C 2A AB F8 45 A0 F2  .....U4&q\*..E..
#     00B0: CF 97 B5 BE AC D7 88 33   7B A6 04 C7 D6 BF FB 03  .......3........
#     00C0: 81 D1 13 68 30 D8 0B 4F   18 F7 77 8F 2D AF 1C 26  ...h0..O..w.-..&
#     00D0: 0A A3 FF BD A9 E4 C7 EA   CE 9F 25 C8 64 7B 6E 7A  ..........%.d.nz
#     00E0: BB 9B 34 A8 34 1A 89 20   2B 03 46 F2 E2 BB F9 CF  ..4.4.. +.F.....
#     00F0: 33 F0 74 CE 76 3D 5F 52   FC A0 B3 A3 CA EB 55 CE  3.t.v=_R......U.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.893 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A0 8D 29 A6 49 01 5D CC   9C 0D 0B D4 10 4D EA CF  ..).I.]......M..
#     0010: 9B 5A 6F BC CF 62 6F EF   5B B8 34 52 E3 9D 48 18  .Zo..bo.[.4R..H.
#     0020: 04 49 B6 BF 21 4B A7 46   0D 11 77 50 03 D8 34 69  .I..!K.F..wP..4i
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.897 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:51.898 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.899 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:51.899 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.900 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:51.901 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:51.903 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.904 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:51.906 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 BB BA 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:35.000 UTC",
#       "not  after"         : "2024-01-18 05:36:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#           0010: 05 67 A1 A9                                        .g..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 EE 4C 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:28.000 UTC",
#       "not  after"         : "2024-01-18 05:36:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.059 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5F 06 A3 EC FB 08 78 26   17 51 49 24 E8 91 33 0B  _.....x&.QI$..3.
#     0010: 1F D7 F1 65 56 9D 31 1E   60 6C 48 80 C9 C7 B4 20  ...eV.1.`lH....
#     0020: 6D D0 42 BC B8 EF B2 78   6C 60 F3 2E 28 95 57 92  m.B....xl`..(.W.
#     0030: BF FB 7E A7 0F FE C1 E7   F2 30 66 1C F9 BE 2C 0D  .........0f...,.
#     0040: C5 29 9E F8 5A 70 A6 F8   D5 00 F9 34 44 26 8B 2E  .)..Zp.....4D&..
#     0050: 11 F3 CE 1B 41 2B 0A 2A   16 62 19 2F 3F 5C DF 84  ....A+.*.b./?\..
#     0060: C6 AE 33 F8 12 EF 3B BF   5A 3D FC 7A 76 E8 D9 34  ..3...;.Z=.zv..4
#     0070: CA A2 97 CD DA BB 52 D1   E5 6C AA A8 1E 1E 1F C3  ......R..l......
#     0080: 4C 2B DF DA B7 10 45 D1   93 6B 79 1F 37 75 62 8F  L+....E..ky.7ub.
#     0090: C5 F9 08 32 A3 C3 D0 CC   78 FB 2F 0A 67 77 06 C4  ...2....x./.gw..
#     00A0: BA 95 5D BD 46 4D 02 91   CD F6 0A 2D 33 56 00 6A  ..].FM.....-3V.j
#     00B0: D4 4B 2E DD 66 B5 3A B3   47 90 BB 85 58 DA 98 A0  .K..f.:.G...X...
#     00C0: 4E 97 C2 B8 9B CF 56 C9   E9 24 1D B6 5C 6B BC 54  N.....V..$..\k.T
#     00D0: AF 6B 96 56 BF BD 4A DB   E1 EA 55 92 BC 4A 95 98  .k.V..J...U..J..
#     00E0: 15 C9 77 B5 19 D8 93 34   8D CA 10 77 7F 40 9A 06  ..w....4...w.@..
#     00F0: DA 1E FF E6 61 AF E6 85   64 0C B3 7B 32 D1 50 65  ....a...d...2.Pe
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.061 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B4 CD 2D 54 92 10 02 80   C4 1C BA 06 5E 75 FE E2  ..-T........^u..
#     0010: CC D2 E7 FB 19 F8 4C 2A   80 0F 44 35 BD C5 1C EE  ......L*..D5....
#     0020: 6B 87 6D E5 9A 82 D7 72   EA B5 74 D7 07 7C 82 9C  k.m....r..t.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.061 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:52.135 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "0D FE 4F 3E 80 92 ED BB 1F 10 5E 5C 66 F7 4C 8C A6 B3 D4 27 72 29 6C AA E4 10 0B 13 23 44 DC 76",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-20 05:36:52.940 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 05:36:52.941 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-20 05:36:54.321; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-20 05:36:54.326; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-20 05:36:54.747; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:54.749; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-20 05:36:54.749; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-44C8sf/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:54.787 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 BB BA 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:35.000 UTC",
#     "not  after"         : "2024-01-18 05:36:35.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#         0010: 05 67 A1 A9                                        .g..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:54.791 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "57 83 73 6C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:26.000 UTC",
#     "not  after"         : "2024-01-18 05:36:26.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-20 05:36:54.804 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:55.089 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:55.091 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:36:55.092 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.096 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.107 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.108 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.108 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:36:55.110 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "44 49 50 B9 AB 0C 33 B9 E3 5E D2 11 83 78 38 6B 80 7A 9E 3E 6F 47 D4 7A CF 54 5A 0D 8B 4E 66 03",
#   "session id"          : "60 48 98 DE 33 F3 59 75 D5 AB 0F 7B 95 FB 67 40 47 2D D7 8D FF A6 92 DF 10 43 57 5F CA B9 63 C4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B5 3C 90 96 87 88 65 D3   12 A6 6B 2E 6D 66 61 29  .<....e...k.mfa)
#             0010: 2A F3 2F 9B 1B E2 6B 73   E1 BD 81 17 73 86 21 43  *./...ks....s.!C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.228 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "ED F9 AA D5 A9 F7 D4 37 EA 80 95 AB FE CE 91 0B A5 E5 B3 BC 48 3A 8E 24 62 6B 25 25 C4 CD D9 A5",
#   "session id"          : "60 48 98 DE 33 F3 59 75 D5 AB 0F 7B 95 FB 67 40 47 2D D7 8D FF A6 92 DF 10 43 57 5F CA B9 63 C4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7A D5 25 C3 96 39 94 78   B3 D7 32 31 F0 9F 2B F9  z.%..9.x..21..+.
#           0010: CF F3 63 37 B6 8A 73 9B   F8 E6 A0 EB E2 D1 95 0C  ..c7..s.........
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.229 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.230 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.237 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.238 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.239 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.249 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.254 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.256 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.259 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.260 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.270 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.270 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.270 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.271 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.272 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.273 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.273 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.284 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 78 03 F0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:31.000 UTC",
#       "not  after"         : "2024-01-18 05:36:31.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8C 34 B4 36 7D DE 2F 2E   40 3A B6 2A 39 B7 EB C3  .4.6../.@:.*9...
#           0010: 11 D0 02 21                                        ...!
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.285 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.343 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 EE 4C 29",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-20 05:36:28.000 UTC",
#     "not  after"         : "2024-01-18 05:36:28.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#         0010: 9F C0 12 7F                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#         0010: C7 2A DD 70                                        .*.p
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.346 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 30 C7 AB C2 52 BA E3 17   D4 F3 6A CC CF 31 7C 19  0...R.....j..1..
#     0010: 04 1B 1E 4C 0B DC 6F FF   83 CB B4 A5 E4 27 63 68  ...L..o......'ch
#     0020: 5D AB E7 76 6E 7E B9 D6   D1 F7 C4 99 A2 FB 9C 7B  ]..vn...........
#     0030: B8 40 63 3F 96 02 8C 80   3A DA A5 EC ED 65 E5 EB  .@c?....:....e..
#     0040: 9A 69 D7 6C 05 2D AC 52   30 51 B0 5A 7F B7 70 72  .i.l.-.R0Q.Z..pr
#     0050: FA 3F F8 EF 41 00 25 83   DE 00 7D EE EB 6F 31 C2  .?..A.%......o1.
#     0060: 61 EF 8C 54 74 6B F0 C6   82 52 31 99 26 D0 18 C4  a..Ttk...R1.&...
#     0070: 9B A6 D6 4D 8B 37 64 6E   49 92 77 45 BD 93 CB 52  ...M.7dnI.wE...R
#     0080: D8 E7 A0 E5 FA 85 2B 57   CF 55 90 AE 84 97 D8 FE  ......+W.U......
#     0090: B7 B5 A0 80 8F A4 33 D6   F9 56 29 F8 5E 9B E5 4A  ......3..V).^..J
#     00A0: FE E4 A6 3C D0 DE 01 97   E4 6D B3 36 E2 B6 6F 3A  ...<.....m.6..o:
#     00B0: 96 5D 61 F7 F9 B9 C2 20   C6 D9 01 90 95 D5 03 9E  .]a.... ........
#     00C0: 47 E5 18 05 90 5F 06 16   0F 31 67 0C 7B 76 F8 97  G...._...1g..v..
#     00D0: B7 DD 9C 7D 79 C8 4E FE   8B DB 75 89 BF E2 79 63  ....y.N...u...yc
#     00E0: 0D 22 6F 6C F8 66 5A E2   D0 0B 92 20 34 EF EA 45  ."ol.fZ.... 4..E
#     00F0: 66 6B 9E D7 09 07 94 43   C1 40 25 81 FC FB 84 B7  fk.....C.@%.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.347 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 85 6F 1E 9D C0 89 4E 44   D0 B1 D9 88 A4 65 DA C7  .o....ND.....e..
#     0010: 96 A1 7A C8 2D 34 1A ED   BA 7F 16 2D CE AB 82 D1  ..z.-4.....-....
#     0020: 5F 17 5D 4B 66 FD 81 49   D0 7B D7 1C 5F 2C AA 62  _.]Kf..I...._,.b
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.349 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-20 05:36:55.350 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.351 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.353 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 BB BA 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:35.000 UTC",
#       "not  after"         : "2024-01-18 05:36:35.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BE 6C 67 54 E9 D6 AA F8   7E 50 13 40 F6 E6 C2 16  .lgT.....P.@....
#           0010: 05 67 A1 A9                                        .g..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 EE 4C 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:28.000 UTC",
#       "not  after"         : "2024-01-18 05:36:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.376 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8A 58 3C 82 B3 BA 06 67   05 C6 DD 03 98 99 DC 21  .X<....g.......!
#     0010: 04 6C 93 8D C5 A3 44 3B   67 02 89 67 6C 91 4E 9B  .l....D;g..gl.N.
#     0020: D6 74 55 74 A2 0C 85 54   0E 02 B1 44 4F 94 0E 62  .tUt...T...DO..b
#     0030: 3A BA 32 78 98 45 C3 ED   23 66 06 11 E9 81 40 99  :.2x.E..#f....@.
#     0040: CE C0 00 71 C4 60 8D 11   78 C1 9B 3D F2 DB D4 A2  ...q.`..x..=....
#     0050: 4E 3C 49 E5 B1 A3 91 31   D7 18 2C 26 47 C5 6D CA  N<I....1..,&G.m.
#     0060: 60 B8 33 39 CD 3F 92 63   A0 98 46 4A EA 5E 15 2C  `.39.?.c..FJ.^.,
#     0070: 76 D4 74 80 08 18 DA EF   24 81 CD 34 F0 E5 3F 59  v.t.....$..4..?Y
#     0080: 61 C9 49 A3 6B 54 A3 2C   AF 61 E4 FF 04 40 88 40  a.I.kT.,.a...@.@
#     0090: 31 8D 66 C9 FD 60 89 4E   4F 6E 7B 64 5A 7A B5 49  1.f..`.NOn.dZz.I
#     00A0: AE 31 12 F0 1F 8F B5 64   31 5E 08 49 B9 09 BE 77  .1.....d1^.I...w
#     00B0: C8 20 1C CD F9 3B 73 AA   DA 45 39 EC B0 C0 68 4B  . ...;s..E9...hK
#     00C0: 2E 04 84 E8 43 C4 20 07   65 2E 9D 45 ED CE 86 8F  ....C. .e..E....
#     00D0: 26 72 3F D6 1B 87 38 AF   49 1A 0D 7E B5 1E DD 2A  &r?...8.I......*
#     00E0: 0E 16 2D FA DF D1 E8 E6   3C C4 CC A2 24 62 B0 D0  ..-.....<...$b..
#     00F0: 44 8D 32 0E 11 C7 B4 66   02 6A D5 13 88 57 7E 9E  D.2....f.j...W..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.378 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B4 DC 7B A8 F1 8E 87 49   F1 E4 DE C6 EC D5 B5 80  .......I........
#     0010: EE E0 05 4C BC B2 15 0D   B8 AC 78 84 47 C5 6B 8D  ...L......x.G.k.
#     0020: 28 EA 62 B1 6E 78 20 4D   10 3C A6 A1 3A BC 1B BA  (.b.nx M.<..:...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.378 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:36:55.432 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1F F3 E2 FE 81 E1 1E AF 16 AA 51 23 11 E9 EB 96 86 AB E6 7A 75 B2 42 12 BE 7B 45 AE 42 12 3D 96",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.785 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.786 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.786 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-20 05:36:55.786 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-20 05:36:55.844 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-20 05:36:55.845 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-20 05:37:07.821; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-20 05:37:08.182 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 83 73 6C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:26.000 UTC",
#       "not  after"         : "2024-01-18 05:36:26.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 EE 4C 29",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-20 05:36:28.000 UTC",
#       "not  after"         : "2024-01-18 05:36:28.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: A3 3F E3 63 3D 8E E6 78   90 E6 33 01 48 30 0A 90  .?.c=..x..3.H0..
#           0010: 9F C0 12 7F                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8D 5A 31 60 BB B9 85 9D   CB 93 D6 EF 66 47 A3 4F  .Z1`........fG.O
#           0010: C7 2A DD 70                                        .*.p
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-20 05:37:08.196 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:37:08.352 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.353 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:37:08.354 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-20 05:37:08.354 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.358 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.369 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.369 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-20 05:37:08.371 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "39 E8 61 85 BB 9A F5 1E 1D 65 DE F1 AF B7 53 65 F2 E0 CA AC 08 98 B1 69 DE 0C 08 46 68 3B E9 71",
#     "session id"          : "A1 89 71 38 F2 9A 06 D6 FE 5F 88 4C 09 85 42 37 22 A6 33 0D AC 97 CF 21 11 54 3D 5E D7 53 CB 9D",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4D 78 56 30 26 D5 74 D9   42 E8 91 BB 2E C3 50 05  MxV0&.t.B.....P.
#               0010: D0 35 3D 54 54 D6 C4 FA   E7 03 EB BD 1A 8A BB 56  .5=TT..........V
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.394 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "33 49 48 44 66 5B 22 EF 24 E6 F7 7A 5E F7 96 21 3C 71 C7 68 32 F8 D1 3E 81 B3 68 13 81 6B 59 C5",
#     "session id"          : "A1 89 71 38 F2 9A 06 D6 FE 5F 88 4C 09 85 42 37 22 A6 33 0D AC 97 CF 21 11 54 3D 5E D7 53 CB 9D",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: A3 89 9F 46 07 A9 24 2D   84 CE 49 7D 35 D3 E2 30  ...F..$-..I.5..0
#             0010: BC AE 9E 3E 35 BC 47 6D   B0 92 50 93 ED 12 EA 06  ...>5.Gm..P.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.394 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.394 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.395 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.396 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.396 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.397 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.397 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.397 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-20 05:37:08.398 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|202

[...truncated too long message...]

28)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14810ms
ok 78 stop command for single port in 17995ms
not ok 79 status detects locally running solr in 1551ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7739ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1545ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3119ms
ok 83 copying files around in 6658ms
ok 84 upconfig in 2768ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1242ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1255ms
not ok 87 Cleanup in 2548ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew (:solr:modules:hadoop-auth)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/modules/hadoop-auth/build/test-results/test/outputs/OUTPUT-org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.txt
    Reproduce with: gradlew :solr:modules:hadoop-auth:test --tests "org.apache.solr.security.hadoop.TestDelegationWithHadoopAuth.testDelegationTokenRenew" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6B1E8E1597B8FEF6 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII

  - org.apache.solr.HelloWorldSolrCloudTestCase.classMethod (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.HelloWorldSolrCloudTestCase.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.HelloWorldSolrCloudTestCase.classMethod" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6B1E8E1597B8FEF6 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 2h 40m 29s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/2ufy5pasw4gmc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8225 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8225/

All tests passed

Build Log:
[...truncated 1433 lines...]
BUILD FAILED in 1h 4m 1s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/clkcyatxuvrcg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8224 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8224/

All tests passed

Build Log:
[...truncated 1472 lines...]
BUILD FAILED in 1h 2m 19s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/54ylzj7m3jjfa

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8223 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8223/

All tests passed

Build Log:
[...truncated 1264 lines...]
# ERROR: Error from server at http://localhost:38115/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16033ms
ok 60 Check help command in 4557ms
ok 61 basic post with a type specified in 5751ms
ok 62 basic post WITHOUT a type specified in 11647ms
ok 63 crawling a directory in 4536ms
ok 64 crawling a web site in 4724ms
ok 65 commit and optimize and delete in 4001ms
ok 66 args mode in 6412ms
ok 67 stdin mode in 3403ms
ok 68 post solr log into solr via script in 10163ms
ok 69 post solr log into solr via cli in 7188ms
ok 70 allowPaths - backup in 16231ms
ok 71 start solr with ssl in 19073ms
not ok 72 use different hostname when not checking peer-name in 20806ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 38115 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38115 (pid=1341639). Happy searching!
#
#     INFO  - 2023-10-19 18:56:21.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:56:21.105; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 18:56:21.609; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 18:56:21.718; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 18:56:21.718; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 18:56:31.631; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 18:56:31.637; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 18:56:32.014; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:38115/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 18:56:33.594; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:56:33.602; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:38115/solr] to [https://127.0.0.1:38115].
# WARN  - 2023-10-19 18:56:34.369; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 18:56:34.405; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17600ms
ok 74 start solr with client truststore and security manager in 19802ms
not ok 75 start solr with mTLS needed in 51518ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-rl5LBQ/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 38115 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38115 (pid=1344380). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 38116 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 38116 (pid=1344495). Happy searching!
#
#     INFO  - 2023-10-19 18:57:37.196; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:57:37.202; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 18:57:37.826; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:37.829; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:37.830; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:37.878 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 A0 09 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:23.000 UTC",
#     "not  after"         : "2024-01-17 18:57:23.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#         0010: 70 CB 1A F8                                        p...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:37.882 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 2C 14 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:15.000 UTC",
#     "not  after"         : "2024-01-17 18:57:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:37.897 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:38.266 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.267 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:38.270 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:38.270 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.277 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.349 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.350 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.350 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:38.352 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2D 9C 6A FB 99 1A 45 9F 11 AF 9B 39 DB FE 2B 50 BB 0B 12 A0 B4 91 04 0A A0 6D 8A B9 3A D5 49 FF",
#   "session id"          : "F1 ED 64 DF 41 08 D6 0F 13 A3 11 12 BA 2C 0D 1B 87 9D 39 98 FA D5 7E FE FF 46 0D F3 FE 58 77 0C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C1 B8 B6 12 73 25 58 72   97 8C AB 55 9C 73 8B EA  ....s%Xr...U.s..
#             0010: 46 3C EF BA CC 7F D4 62   64 E3 4C 58 88 8A 88 03  F<.....bd.LX....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.595 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 84 1C E8 3E E0 C4 AF 4F CD 1C 9A 25 6E 1D E4 F9 52 2E AF BB F6 AC 0A 84 53 E0 6B CE E4 97 CE",
#   "session id"          : "F1 ED 64 DF 41 08 D6 0F 13 A3 11 12 BA 2C 0D 1B 87 9D 39 98 FA D5 7E FE FF 46 0D F3 FE 58 77 0C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 4C F9 3E AC 83 ED 01 3A   EA 7E C3 70 1C AD 3A 34  L.>....:...p..:4
#           0010: 71 9F AA AA 59 2F 07 FF   3C 01 AC AA 05 5B 0C 27  q...Y/..<....[.'
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.595 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.595 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.794 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.794 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.796 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.798 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.799 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.801 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.802 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.845 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.850 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.865 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.892 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.893 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.893 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.895 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.901 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.901 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.905 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.906 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.906 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.906 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.907 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.907 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:38.908 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.923 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 9D 21 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:19.000 UTC",
#       "not  after"         : "2024-01-17 18:57:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 5D 75 BC F6 1E 50 51   58 E4 30 2C C2 73 6A 2A  q]u...PQX.0,.sj*
#           0010: 15 39 61 15                                        .9a.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:38.924 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.436 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.440 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C 49 1D 05 7C F1 55 CC   35 7A 08 9A F7 ED 55 A5  .I....U.5z....U.
#     0010: 46 92 0C 67 A8 7B 1A DB   08 9F CC 5F 68 FD 0C CF  F..g......._h...
#     0020: 0A 3A 9C F8 74 86 22 6B   E9 6B 2E 00 1C F5 51 F8  .:..t."k.k....Q.
#     0030: F2 4F 7B BE 07 E1 5B CD   3A 67 CE 8D 83 1B 85 72  .O....[.:g.....r
#     0040: 67 43 0A A4 67 0E 09 5A   48 E0 D8 81 8F F7 E9 D9  gC..g..ZH.......
#     0050: 39 E2 09 3C EE F9 15 73   91 6E EC EB 51 0B F2 D1  9..<...s.n..Q...
#     0060: C5 57 84 C9 62 E6 F5 63   6B 3B E4 49 8C CE C2 21  .W..b..ck;.I...!
#     0070: A8 3C E9 33 D6 52 26 17   FE BB 4A 6A 6C D5 E8 65  .<.3.R&...Jjl..e
#     0080: D9 DD 5F 18 3A 23 5C EF   60 C5 80 58 1A E1 28 79  .._.:#\.`..X..(y
#     0090: AF 9F 81 E9 81 EE 91 B8   47 1F 15 E3 30 CC F6 6E  ........G...0..n
#     00A0: 39 0E 25 03 88 34 DC 8E   C6 46 52 70 BA 2A 5C B9  9.%..4...FRp.*\.
#     00B0: 35 93 1A 46 79 49 4D 7A   15 93 7E 09 4B A5 41 77  5..FyIMz....K.Aw
#     00C0: 37 81 BB 28 57 A2 43 B0   B2 00 E0 49 8B 1F 53 17  7..(W.C....I..S.
#     00D0: 21 C5 5F C2 C7 23 04 07   DF 07 2A FB BF 40 C5 2A  !._..#....*..@.*
#     00E0: EC 5E 78 BE C0 79 38 08   13 F6 63 45 01 AD 3A 44  .^x..y8...cE..:D
#     00F0: 7B 3C A3 40 16 E9 32 8C   94 66 07 F9 2A 7D B8 97  .<.@..2..f..*...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.442 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1B 4A 73 5E B1 83 81 3A   F8 60 86 65 9D 49 8E 6B  .Js^...:.`.e.I.k
#     0010: 08 3A 01 D2 C5 D5 3E 64   5B 61 40 AC CF 72 22 5E  .:....>d[a@..r"^
#     0020: 6A 0B 08 B2 80 F6 12 3F   14 73 55 3B 13 FC BC F1  j......?.sU;....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.444 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:39.445 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.446 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.448 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 A0 09 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:23.000 UTC",
#       "not  after"         : "2024-01-17 18:57:23.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#           0010: 70 CB 1A F8                                        p...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 82 38 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:17.000 UTC",
#       "not  after"         : "2024-01-17 18:57:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.506 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 45 96 CB 55 CF 6A A6 9E   DE 4C A7 78 CF 69 DA BB  E..U.j...L.x.i..
#     0010: 47 57 CB A9 73 B8 1F 5D   44 21 03 D1 6A DB 04 AE  GW..s..]D!..j...
#     0020: 0F 4D 4A 83 1E 3D 4E 7C   48 E4 D1 C6 F4 6F 97 C2  .MJ..=N.H....o..
#     0030: 3B A9 68 9C 8A 64 1A 83   12 78 03 2E 7E A0 5F BE  ;.h..d...x...._.
#     0040: AE A7 ED 2A C4 77 24 CB   D0 2C 50 B7 DD 7B 47 DA  ...*.w$..,P...G.
#     0050: 7F 42 BF FF 88 D5 79 83   87 B2 A2 11 69 53 B4 23  .B....y.....iS.#
#     0060: FD C5 DA D2 DE 9D 53 BB   C2 53 9E 54 E1 DD 27 88  ......S..S.T..'.
#     0070: 47 FA 40 F3 70 DF 4A 5C   3D 46 5B DB 44 8E BF F5  G.@.p.J\=F[.D...
#     0080: 7B 20 87 75 1C 58 85 2C   00 3D B9 7A EC A0 0D 7B  . .u.X.,.=.z....
#     0090: C0 2A 17 4B 55 C6 4D 05   22 15 18 68 49 F3 FE CC  .*.KU.M."..hI...
#     00A0: FF 69 88 F9 AE 44 89 B0   D7 37 70 2A 32 FE E7 7E  .i...D...7p*2...
#     00B0: E1 AC 33 24 E6 D8 A6 3F   E0 DF 49 4B 43 B1 25 AD  ..3$...?..IKC.%.
#     00C0: 4C 69 9F F2 BB 09 1B 50   31 0E 92 6F 51 D0 96 7C  Li.....P1..oQ...
#     00D0: 6C 68 3B 92 16 82 FB 9F   70 2E 74 02 B9 E7 A1 20  lh;.....p.t....
#     00E0: 12 9B 4E 6A C1 3A B3 9F   9D BB 62 59 44 2D 74 59  ..Nj.:....bYD-tY
#     00F0: 42 4A A6 13 67 64 DC 8B   35 29 F9 C9 F5 F4 56 08  BJ..gd..5)....V.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.511 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D7 CF 5E E4 D5 E3 ED 75   08 2B 9B 83 C5 44 BA C5  ..^....u.+...D..
#     0010: 77 F0 5B E7 5C 97 B2 D3   34 0C 92 E9 A4 EA BE 2B  w.[.\...4......+
#     0020: 52 90 09 6B 07 F8 20 E6   C3 D1 FF 50 A2 4D 53 06  R..k.. ....P.MS.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.515 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:39.603 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1C AC 6B DE CE E3 D8 18 3A CE 9E 80 01 A1 85 B1 CF B6 A1 8D 2D 28 13 8D 43 5B 38 67 01 DE 5B 60",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 18:57:40.061 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 18:57:40.061 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 18:57:41.822; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 18:57:41.826; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 18:57:42.190; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@43b4fe19(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:42.192; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 18:57:42.192; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(ca,h=[localhost],a=[],w=[]) for Client@2c1b9e4b[provider=null,keyStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-rl5LBQ/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:42.224 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "61 A0 09 38",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:23.000 UTC",
#     "not  after"         : "2024-01-17 18:57:23.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#         0010: 70 CB 1A F8                                        p...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:42.228 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "32 2C 14 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:15.000 UTC",
#     "not  after"         : "2024-01-17 18:57:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:42.240 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:42.408 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.409 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:42.410 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:42.410 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.415 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.425 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.426 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.426 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:42.428 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "85 3A C8 10 19 94 5A 74 AF C5 1B 39 B3 58 24 9F 05 B4 6B 25 38 CC 11 41 CA 5D 29 D0 4D 2E 67 51",
#   "session id"          : "15 7A DE 21 1A CC 65 79 25 04 0D 09 08 F1 0C 25 45 18 97 C3 38 7B 52 B9 3C EC 1B E3 0F 4F 38 2E",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 42 00 B9 1B BD A4 A1 CC   35 4F E7 41 40 B2 97 94  B.......5O.A@...
#             0010: B4 B8 A8 1F 15 7C C5 38   0B FB 59 F0 E1 8F 3D 61  .......8..Y...=a
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.512 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "62 02 4C F4 DD DE 7F B4 FD 68 40 44 53 F1 05 97 02 91 38 D5 7B 34 C6 07 28 9A 2C 4E BD 59 7F A4",
#   "session id"          : "15 7A DE 21 1A CC 65 79 25 04 0D 09 08 F1 0C 25 45 18 97 C3 38 7B 52 B9 3C EC 1B E3 0F 4F 38 2E",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B6 7A 15 C2 14 77 7E E0   E8 B2 8B AF 02 82 5E D1  .z...w........^.
#           0010: 42 45 12 FA C8 B7 03 94   C8 FF FC D1 99 F8 D5 07  BE..............
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.512 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.512 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.513 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.538 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.540 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.542 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.552 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.552 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.552 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.553 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.556 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.556 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.557 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.558 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.558 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.558 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.559 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.559 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.559 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.562 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5A 9D 21 B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:19.000 UTC",
#       "not  after"         : "2024-01-17 18:57:19.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 71 5D 75 BC F6 1E 50 51   58 E4 30 2C C2 73 6A 2A  q]u...PQX.0,.sj*
#           0010: 15 39 61 15                                        .9a.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.562 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.615 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 82 38 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 18:57:17.000 UTC",
#     "not  after"         : "2024-01-17 18:57:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#         0010: A8 48 63 4E                                        .HcN
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#         0010: 96 A4 67 75                                        ..gu
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.618 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 38 60 18 34 B9 D5 69 20   CF 00 F0 34 F3 33 7A C7  8`.4..i ...4.3z.
#     0010: 61 FE 77 DF CD 49 80 F6   0D 96 06 DF A8 7F 19 0B  a.w..I..........
#     0020: 83 B1 03 61 63 B2 1E DC   3E 26 C5 18 28 40 40 CE  ...ac...>&..(@@.
#     0030: D4 C9 D8 A5 AF B0 B3 70   A4 62 14 7E FB C1 80 8A  .......p.b......
#     0040: 71 3E 16 30 54 90 6F EB   26 FE 86 53 A2 B0 29 1B  q>.0T.o.&..S..).
#     0050: 38 3B B5 A7 15 46 60 DE   E6 66 0E 69 BA 92 AF 5F  8;...F`..f.i..._
#     0060: F9 27 B4 AB CC 2B 17 E4   F5 4C 5E 73 CC F9 B4 18  .'...+...L^s....
#     0070: 9A BE FE 0A B5 F0 BD 41   69 C6 3F EE 05 CC F2 D6  .......Ai.?.....
#     0080: CA 99 FA 66 3B AE 59 B7   CC 1C 9C E9 FD B8 D1 80  ...f;.Y.........
#     0090: 2C F0 07 67 67 A3 8E 62   41 57 18 33 01 C4 F5 6A  ,..gg..bAW.3...j
#     00A0: C6 82 3C AE 6C 09 0F C1   A3 61 7A 78 21 7B 73 2C  ..<.l....azx!.s,
#     00B0: A7 C2 96 12 96 AE D1 1F   3E B0 85 3E 4E C1 09 AD  ........>..>N...
#     00C0: 2B 62 48 D1 4C 4E 82 04   4C F1 8B 6D DE 65 89 CC  +bH.LN..L..m.e..
#     00D0: 28 D1 CD 24 38 73 64 48   65 44 0E 93 C3 BA 18 3F  (..$8sdHeD.....?
#     00E0: 9A 2C A5 27 D8 49 87 7D   AB 94 19 60 03 79 0B 27  .,.'.I.....`.y.'
#     00F0: 64 35 03 9D 8E 54 17 58   A5 4F F1 4A CC A5 75 2E  d5...T.X.O.J..u.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.619 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2C C3 35 FF CC 37 D8 99   DD 26 86 2E C9 B3 43 B0  ,.5..7...&....C.
#     0010: 6E 11 3F CA 62 C1 58 76   F4 74 33 E1 0A C2 70 0F  n.?.b.Xv.t3...p.
#     0020: 07 F8 65 6F D2 52 D8 F6   4E A3 D0 22 95 D6 E4 8E  ..eo.R..N.."....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.621 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.622 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.624 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "61 A0 09 38",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:23.000 UTC",
#       "not  after"         : "2024-01-17 18:57:23.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B9 3D 4C 50 DD EC EF CE   94 08 73 EA 42 0D 89 15  .=LP......s.B...
#           0010: 70 CB 1A F8                                        p...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 82 38 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:17.000 UTC",
#       "not  after"         : "2024-01-17 18:57:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.647 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 44 DE 2F 2C CE CA C1 BF   45 00 02 49 90 5F 42 77  D./,....E..I._Bw
#     0010: 88 DE DD 75 02 BD 1A 70   33 2E FB 35 28 2C 83 0D  ...u...p3..5(,..
#     0020: 8F F5 D6 B4 52 4D 2F 6E   40 8C 46 6C BA 49 ED CA  ....RM/n@.Fl.I..
#     0030: 3F E9 13 4C AB 2B 83 D4   53 29 DE 94 91 14 CD BD  ?..L.+..S)......
#     0040: E0 03 8B 9A ED 3A 3F D6   58 60 7C D7 6F BB 43 52  .....:?.X`..o.CR
#     0050: 04 3D 2A 92 30 27 D1 64   56 86 B9 A3 43 DA ED E7  .=*.0'.dV...C...
#     0060: 21 DC F5 72 BC 3E E1 D5   12 84 F7 F0 33 A6 F4 8F  !..r.>......3...
#     0070: 56 5D 8F 65 D8 FA AA C6   7E 3C 9C 9E 46 C2 EE 38  V].e.....<..F..8
#     0080: 7B 47 D3 21 D8 3F 45 93   46 4A 24 E6 0A F3 F7 31  .G.!.?E.FJ$....1
#     0090: 10 FF 9A E7 F5 C0 FD D1   A6 97 E4 6A 0C 59 7B A4  ...........j.Y..
#     00A0: 71 75 11 AD 89 51 7D 35   13 5D 70 7B 90 87 C0 F6  qu...Q.5.]p.....
#     00B0: 56 AC 46 CF 64 99 99 E7   D5 2A 0E DB BC C9 92 56  V.F.d....*.....V
#     00C0: 0A 16 C7 85 E4 5A 92 2A   BE A7 78 8E DD AD E3 7C  .....Z.*..x.....
#     00D0: D7 C7 ED BC F4 0C 48 7A   BF 38 79 4A E9 03 37 0D  ......Hz.8yJ..7.
#     00E0: 23 75 01 2E 7D 0D 4D 4F   01 1D 67 E6 4C 15 86 54  #u....MO..g.L..T
#     00F0: CE 48 7D B5 91 CD 6A 1B   6B 92 63 8F 28 70 01 06  .H....j.k.c.(p..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.648 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 44 85 BB 9C C4 10 31 78   E4 D7 20 4A 1E 1A A1 C0  D.....1x.. J....
#     0010: B8 EC 50 EB 79 09 24 8B   AE FD 34 23 91 B4 AE 5C  ..P.y.$...4#...\
#     0020: F8 B3 FF 8A 4D 5B C4 71   3D B9 3E 6B 45 4E 71 A3  ....M[.q=.>kENq.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.648 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 18:57:42.939 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:42.943 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "80 C0 FE EE 9F 76 5A 00 B5 DE 34 D5 B3 68 1A B4 56 77 11 AA 97 DC DB 34 A4 95 A7 E8 CB DB 8D A3",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 18:57:43.202 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 18:57:43.203 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-19 18:57:56.260; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:56.839 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 82 38 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:17.000 UTC",
#       "not  after"         : "2024-01-17 18:57:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 10 0E C3 1E 02 66 F8 E8   0F 67 23 6F 4C 10 6A 96  .....f...g#oL.j.
#           0010: 96 A4 67 75                                        ..gu
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "32 2C 14 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 18:57:15.000 UTC",
#       "not  after"         : "2024-01-17 18:57:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 2A C7 EC 67 C5 D1 2F B9   46 6D 41 82 1C 20 22 BF  *..g../.FmA.. ".
#           0010: A8 48 63 4E                                        .HcN
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 18:57:56.853 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:57.008 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:57.010 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 18:57:57.010 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.014 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.026 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.026 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 18:57:57.028 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C7 AF 7E D9 D8 71 02 B2 19 A4 6C BD 96 26 62 8B 58 71 FF D2 78 F0 D5 D4 5E 61 82 57 A4 FA 2F 79",
#     "session id"          : "60 DE F9 89 88 57 D8 9C 08 29 57 4F 4B 80 2B 83 F3 7A 4E 56 52 C2 5B B4 D5 C1 50 DE 35 13 59 AB",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 74 B4 C8 33 D2 20 23 77   C7 2E 7F 10 51 2F 06 BC  t..3. #w....Q/..
#               0010: 35 67 92 F4 00 93 A9 31   EC 03 84 0B 10 B5 7F 37  5g.....1.......7
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.049 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D3 CC AF CE 13 91 52 FC A2 DA C1 7D E7 8C 3F 45 7B 18 D9 19 A7 DC 6D 2B F6 2F D0 91 80 AC 60 DF",
#     "session id"          : "60 DE F9 89 88 57 D8 9C 08 29 57 4F 4B 80 2B 83 F3 7A 4E 56 52 C2 5B B4 D5 C1 50 DE 35 13 59 AB",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: CD 6F A3 1F D5 F7 39 B0   9F 58 70 19 62 32 A2 54  .o....9..Xp.b2.T
#             0010: 68 3D 35 1A 52 81 8C 01   1A 72 B6 8D 97 21 09 7E  h=5.R....r...!..
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.049 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.050 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.051 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.052 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.053 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.054 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.060 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.062 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.063 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 18:57:57.070 UT

[...truncated too long message...]

pl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14738ms
ok 78 stop command for single port in 17603ms
not ok 79 status detects locally running solr in 1536ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7454ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1562ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3378ms
ok 83 copying files around in 7639ms
ok 84 upconfig in 2626ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1243ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1247ms
not ok 87 Cleanup in 2477ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 5s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ieg3ecbumkyzk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8222 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8222/

All tests passed

Build Log:
[...truncated 1261 lines...]
# ERROR: Error from server at http://localhost:35609/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16252ms
ok 60 Check help command in 4565ms
ok 61 basic post with a type specified in 5653ms
ok 62 basic post WITHOUT a type specified in 11672ms
ok 63 crawling a directory in 4402ms
ok 64 crawling a web site in 5133ms
ok 65 commit and optimize and delete in 3805ms
ok 66 args mode in 6535ms
ok 67 stdin mode in 3435ms
ok 68 post solr log into solr via script in 9763ms
ok 69 post solr log into solr via cli in 7244ms
ok 70 allowPaths - backup in 16700ms
ok 71 start solr with ssl in 18831ms
not ok 72 use different hostname when not checking peer-name in 20342ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 35609 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35609 (pid=878658). Happy searching!
#
#     INFO  - 2023-10-19 15:43:41.540; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:43:41.546; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 15:43:42.082; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 15:43:42.163; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 15:43:42.164; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 15:43:51.961; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 15:43:51.966; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 15:43:52.374; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@3d08f3f5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:35609/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 15:43:53.729; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:43:53.734; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35609/solr] to [https://127.0.0.1:35609].
# WARN  - 2023-10-19 15:43:54.595; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 15:43:54.630; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16583ms
ok 74 start solr with client truststore and security manager in 19456ms
not ok 75 start solr with mTLS needed in 52314ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-HRwwlx/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35609 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35609 (pid=881353). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35610 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 35610 (pid=881523). Happy searching!
#
#     INFO  - 2023-10-19 15:44:56.245; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:44:56.258; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 15:44:57.099; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:44:57.102; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:44:57.104; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:44:57.189 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 0B 8E 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:42.000 UTC",
#     "not  after"         : "2024-01-17 15:44:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#         0010: BC B5 F1 5B                                        ...[
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:44:57.199 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 6B CB 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:33.000 UTC",
#     "not  after"         : "2024-01-17 15:44:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:44:57.225 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:44:57.713 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.713 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:44:57.721 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:44:57.722 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.729 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.751 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.751 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.751 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:44:57.753 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "12 DD BE 42 80 BC 41 49 2A 15 2E 8A 71 74 D3 FB 28 52 A1 39 38 F3 00 18 A2 08 68 94 86 08 60 19",
#   "session id"          : "BB BD 62 A9 2B 83 3E E6 72 1F 8D 9D 88 ED 14 0B 03 C3 92 26 FE 53 B6 C4 64 58 84 36 56 D8 24 7B",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DF 34 A7 9F 12 D9 5C 7A   E8 7B A3 D5 95 C9 D3 BA  .4....\z........
#             0010: 08 80 83 7A 46 54 34 0F   B3 04 72 95 9A 88 36 5B  ...zFT4...r...6[
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.312 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "20 41 09 C9 D5 F7 0B 8B AC 20 FE 71 7D 07 F6 4E 56 5D 9F 0F 4B 63 59 0E A6 7B 9E 4F 2F B8 16 F9",
#   "session id"          : "BB BD 62 A9 2B 83 3E E6 72 1F 8D 9D 88 ED 14 0B 03 C3 92 26 FE 53 B6 C4 64 58 84 36 56 D8 24 7B",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: DE 6E B7 20 F5 F5 FB 63   EC 7E 75 74 96 79 76 4F  .n. ...c..ut.yvO
#           0010: AA B1 EC 82 80 6B 4C DA   49 76 C8 89 6E 85 D9 2D  .....kL.Iv..n..-
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.313 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.316 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.321 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.321 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.321 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.322 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.324 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.325 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.339 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.340 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.345 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.348 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.349 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.350 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.350 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.350 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.351 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.351 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.352 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.352 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.354 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C F1 6B 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:38.000 UTC",
#       "not  after"         : "2024-01-17 15:44:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 38 5F 50 7C F3 B4 44   AD AA CA 2D B2 08 F1 8A  .8_P...D...-....
#           0010: C8 6B 9B C5                                        .k..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.354 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.493 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.502 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 53 1A 73 17 C7 57 34   52 40 92 40 97 E1 BE 6D  QS.s..W4R@.@...m
#     0010: 58 7A 5C 54 13 29 45 D1   EF 1B E1 A3 24 F9 74 BC  Xz\T.)E.....$.t.
#     0020: CC 31 EF 89 0E 49 64 86   C0 BE 30 7E 0B 1F FC 70  .1...Id...0....p
#     0030: 67 6C 4C BE 1B 6E 91 E0   58 94 55 07 3B 29 B3 C5  glL..n..X.U.;)..
#     0040: 26 9E 9A 1D 40 82 48 DF   A5 EB 18 33 A1 56 44 AD  &...@.H....3.VD.
#     0050: DB 99 FB 17 FB DB 66 BE   AC 7F 02 D7 05 4F A9 9D  ......f......O..
#     0060: 80 84 F1 C5 1A BE C6 4E   D8 36 61 13 80 EB B1 D4  .......N.6a.....
#     0070: 1E 42 5C F5 8E 71 8F EF   09 AC 02 0A 90 B9 04 AB  .B\..q..........
#     0080: 10 56 8F AC A7 6E 43 2D   D5 B2 EF 33 B9 5B 6B 41  .V...nC-...3.[kA
#     0090: AE C2 6B 1A DC 42 9A 2D   89 5E 61 DE 78 58 AC AD  ..k..B.-.^a.xX..
#     00A0: B9 D6 83 8B 9F 00 DF 2A   7B 3D 0A DA 57 B6 60 FD  .......*.=..W.`.
#     00B0: BD 71 D4 20 C2 4B 00 05   8A C7 00 A8 C0 EC 3C 99  .q. .K........<.
#     00C0: AE 42 8B CD 17 A0 4C 21   B3 EE 7F A4 6B A8 17 17  .B....L!....k...
#     00D0: 0F 1C 5E 3B 91 91 FA 96   DD CE ED B4 9C BA 73 3A  ..^;..........s:
#     00E0: BD A7 0F 56 3C 92 27 D3   1A 00 D8 D2 D9 83 03 41  ...V<.'........A
#     00F0: 5D DE FC 84 AC 82 ED 7A   BE 29 4D F2 37 E9 F9 EF  ]......z.)M.7...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.504 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3C 7B 5C 9A D6 13 23 79   FC 48 85 9A 51 F0 67 34  <.\...#y.H..Q.g4
#     0010: 78 00 45 58 26 25 31 96   0A A2 37 D5 74 2E CF 0E  x.EX&%1...7.t...
#     0020: D4 86 CD 59 37 1A 97 30   2B 1B F2 A0 20 35 19 8F  ...Y7..0+... 5..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.506 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:44:58.507 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.507 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.508 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.513 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A 0B 8E 36",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:42.000 UTC",
#       "not  after"         : "2024-01-17 15:44:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#           0010: BC B5 F1 5B                                        ...[
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 79 A3 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:36.000 UTC",
#       "not  after"         : "2024-01-17 15:44:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.552 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 56 6F E3 C0 85 26 CE A3   DD 95 E1 51 9E 47 D2 9B  Vo...&.....Q.G..
#     0010: 67 C3 80 3D 71 57 3D 60   BA D2 91 03 85 47 D9 8E  g..=qW=`.....G..
#     0020: BB 0B A5 A3 F2 05 D1 9A   12 11 94 B9 CC F3 DF BD  ................
#     0030: 63 A6 61 9B 02 6F A7 08   9D BB 96 08 74 72 A9 5E  c.a..o......tr.^
#     0040: 3A 8C 07 C4 FF F0 44 37   C4 99 64 BB DA C9 CD DE  :.....D7..d.....
#     0050: 8E A3 CB 61 BE 1D F6 66   34 0F 5D 3C E6 BF 5B D5  ...a...f4.]<..[.
#     0060: 62 0B 47 3A D9 86 04 02   F2 B6 37 00 3C 5A 38 2E  b.G:......7.<Z8.
#     0070: B3 89 56 2A 53 13 9A 04   2A 4D 47 5B 4C 85 7F FF  ..V*S...*MG[L...
#     0080: 1E 32 D9 CB 3E 1E D4 74   A5 4F F6 DC A6 F5 C4 46  .2..>..t.O.....F
#     0090: E7 51 12 6E 20 41 F1 F4   99 DE 19 CF 11 3B 3A 12  .Q.n A.......;:.
#     00A0: 02 D2 0B 3A 49 AF 68 EE   44 0D 91 98 1A 64 F9 7B  ...:I.h.D....d..
#     00B0: F3 51 80 3F 83 68 C7 15   A6 E7 7D 50 8C 76 22 7C  .Q.?.h.....P.v".
#     00C0: 93 2B 14 42 5E 9D DE 7B   4A 75 2F F7 80 82 5F 58  .+.B^...Ju/..._X
#     00D0: 94 C2 BD EB 13 38 B0 42   30 76 C9 48 1D 25 D7 00  .....8.B0v.H.%..
#     00E0: 1A F1 AC B3 AE A3 33 FD   AD BD 5A A1 01 D9 1B DA  ......3...Z.....
#     00F0: A2 30 92 3C 2C 2A 88 F7   90 6F 35 12 0A 04 FF 50  .0.<,*...o5....P
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.555 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E3 22 33 6B 76 07 CF 7F   E1 01 AB 84 19 37 85 94  ."3kv........7..
#     0010: 68 80 BC B0 DD 1B 8E A9   8A F3 C2 E5 E8 03 BC DD  h...............
#     0020: D9 BD 90 18 B2 96 EF A4   49 59 1C A9 88 B9 6B FF  ........IY....k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.560 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.645 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.646 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.646 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:44:58.646 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:44:58.708 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E3 66 A4 EF 46 3E 81 4D B0 BC 65 35 C9 FD 84 DA 3A 11 88 3E 4B 98 EC E5 28 F3 00 1E 25 09 C9 A1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 15:44:59.581 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 15:44:59.582 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-19 15:44:59.594 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-19 15:45:01.121; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 15:45:01.126; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 15:45:01.536; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:45:01.538; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 15:45:01.539; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(ca,h=[localhost],a=[],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-HRwwlx/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:01.583 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3A 0B 8E 36",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:42.000 UTC",
#     "not  after"         : "2024-01-17 15:44:42.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#         0010: BC B5 F1 5B                                        ...[
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:01.587 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "77 6B CB 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:33.000 UTC",
#     "not  after"         : "2024-01-17 15:44:33.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:01.600 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:01.781 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.781 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:01.783 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:01.783 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.788 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.799 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.800 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.801 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:01.803 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "55 F1 03 31 5A 18 84 E3 12 7D 9C 6A 23 2B 3C 0D B5 2D BE D8 B6 00 CE 4C 63 44 4D 8F F9 D5 6E 67",
#   "session id"          : "E5 85 93 5E 91 C0 06 1C 6E F6 86 13 11 BF C6 B4 EC 12 59 B0 CE 83 AA 0D A1 49 D8 95 D1 9A 5F 21",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EB 7A 19 0C 42 95 94 E7   CC D9 73 73 06 BE 36 2C  .z..B.....ss..6,
#             0010: 71 E4 CC B3 64 DF 71 44   18 AF 19 D5 24 99 38 35  q...d.qD....$.85
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.928 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "68 22 63 4C E4 08 08 0F 56 50 33 A6 7E E8 2B E5 F8 7B 61 C1 F9 DC 11 15 9C 69 34 AD 9C 88 EF B4",
#   "session id"          : "E5 85 93 5E 91 C0 06 1C 6E F6 86 13 11 BF C6 B4 EC 12 59 B0 CE 83 AA 0D A1 49 D8 95 D1 9A 5F 21",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: B3 6C EC 8D 17 5A F3 22   71 98 59 94 DA 2D 88 5B  .l...Z."q.Y..-.[
#           0010: C0 D6 A9 79 84 F3 29 89   95 0E 80 CA 49 C0 A1 6F  ...y..).....I..o
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.929 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.929 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.931 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.933 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.933 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.935 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.941 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.942 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.943 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.944 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.945 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.946 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.974 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.985 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.986 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.992 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.993 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.993 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.996 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.996 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.996 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.997 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.997 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:01.998 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:01.998 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.000 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2C F1 6B 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:38.000 UTC",
#       "not  after"         : "2024-01-17 15:44:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8E 38 5F 50 7C F3 B4 44   AD AA CA 2D B2 08 F1 8A  .8_P...D...-....
#           0010: C8 6B 9B C5                                        .k..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.000 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.072 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4C 79 A3 74",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 15:44:36.000 UTC",
#     "not  after"         : "2024-01-17 15:44:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#         0010: E0 E5 42 2E                                        ..B.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#         0010: 6A 36 1C 76                                        j6.v
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.075 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D 01 69 FF 50 26 14 A4   39 1B 01 2B E9 38 D2 9A  m.i.P&..9..+.8..
#     0010: 8D 16 FB D3 77 59 F0 45   23 C9 E2 C7 2A E0 AF D1  ....wY.E#...*...
#     0020: 29 BE 83 8B 39 01 60 56   BE 11 4D AB 99 C1 61 CC  )...9.`V..M...a.
#     0030: 85 C3 12 8D 0A 0D 60 F0   96 47 8D B4 C1 BB CB 9A  ......`..G......
#     0040: 8A 1F BE 60 C2 11 6A D6   33 02 BA B5 2D 08 15 59  ...`..j.3...-..Y
#     0050: F3 D4 3E 17 95 32 4A D6   73 8F 12 BF 2D 37 2B 4B  ..>..2J.s...-7+K
#     0060: F5 78 1D 09 E0 F2 8C 3D   02 70 30 42 AA 38 88 6D  .x.....=.p0B.8.m
#     0070: 5E C5 3B 91 8F 70 14 1C   8C A9 C5 57 0F AA AD 59  ^.;..p.....W...Y
#     0080: 08 E3 7D B8 21 9B A2 B2   81 34 2B F2 30 CF 8D 5A  ....!....4+.0..Z
#     0090: D2 79 2E 5E 8A E1 40 B8   EE BF F9 54 8A C4 80 0C  .y.^..@....T....
#     00A0: F6 21 1F 78 42 39 08 5D   93 C3 F9 5C 80 49 5E 4E  .!.xB9.]...\.I^N
#     00B0: 9F 14 80 4C 72 72 B3 C6   98 0F 4C 6C BF 9C D6 80  ...Lrr....Ll....
#     00C0: 9F 45 09 B5 DE F6 D0 E3   41 F0 3C 26 A9 7D 9B 1A  .E......A.<&....
#     00D0: C6 9D 83 B0 94 48 6E FE   70 F0 02 32 02 36 54 12  .....Hn.p..2.6T.
#     00E0: 4C AE BE 31 20 93 E5 FB   0B 10 CE 3D 33 DA 97 0F  L..1 ......=3...
#     00F0: 16 CF 1E 7E 21 4F F7 CE   73 7F BD A8 FF D4 7C 5C  ....!O..s......\
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.077 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 77 13 1F 54 BA C7 40 50   DF 73 A4 F1 24 1F 1B E4  w..T..@P.s..$...
#     0010: 49 51 A9 44 23 24 7B 7A   39 30 71 6C 22 AF 94 7A  IQ.D#$.z90ql"..z
#     0020: 7C 4B D5 B1 C4 F9 E3 E4   4B 93 A9 39 DD 92 81 40  .K......K..9...@
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.078 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:45:02.079 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:02.079 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.080 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.083 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3A 0B 8E 36",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:42.000 UTC",
#       "not  after"         : "2024-01-17 15:44:42.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 6D 0A 60 3F 71 21 C1 9F   7D AC 89 22 3B 3F 24 F2  m.`?q!.....";?$.
#           0010: BC B5 F1 5B                                        ...[
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 79 A3 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:36.000 UTC",
#       "not  after"         : "2024-01-17 15:44:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.107 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0E DD 02 CB F3 D0 EF C2   26 77 1D 38 96 58 23 F2  ........&w.8.X#.
#     0010: 35 9A 4C A5 42 D7 81 7C   9A 4A 2A D9 B2 F7 BD 21  5.L.B....J*....!
#     0020: 23 A4 54 C9 8B 30 6F AA   28 6A A7 92 33 B1 88 94  #.T..0o.(j..3...
#     0030: 19 67 39 25 ED CB 04 E0   00 A9 B7 85 94 66 CE 60  .g9%.........f.`
#     0040: 7B 52 53 9E A2 40 A0 46   67 B7 3C 4B 32 8F 86 F3  .RS..@.Fg.<K2...
#     0050: 18 56 2B B5 CE 2A 3F 04   8E FD 29 82 E0 05 C7 03  .V+..*?...).....
#     0060: 01 FF FB F7 0F C4 56 0C   C1 3C 72 22 69 68 2A 0C  ......V..<r"ih*.
#     0070: 01 94 C8 FD F3 E2 94 D2   1B A7 E3 A2 A2 FE 68 FA  ..............h.
#     0080: C9 45 21 05 D0 4B 99 0F   48 57 F4 53 9A 2E 7B 10  .E!..K..HW.S....
#     0090: B4 F4 87 9F E9 8F 9E 2B   F6 7F 8B 92 7A 6A D3 99  .......+....zj..
#     00A0: 42 F8 F8 EF C8 10 2A 69   36 F7 14 A4 21 84 83 FA  B.....*i6...!...
#     00B0: 31 C7 00 98 08 80 0E 9D   8E F8 C8 2F A3 5B 57 F5  1........../.[W.
#     00C0: AB B5 CF 30 30 38 19 01   C9 AA 46 D0 E1 F1 60 DC  ...008....F...`.
#     00D0: 08 BE 8C 40 C2 53 A7 60   BB F5 F5 42 D0 9B 7A EC  ...@.S.`...B..z.
#     00E0: BF D6 5E 8A EA 17 90 E5   A2 45 A2 54 1A D5 92 86  ..^......E.T....
#     00F0: 5F 44 96 C8 C1 B1 33 CA   66 FF A3 0D 57 51 EF D9  _D....3.f...WQ..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.108 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D8 23 EB 93 46 C4 B1 C2   3F 73 37 E5 0E B4 35 BC  .#..F...?s7...5.
#     0010: E9 8D D6 62 2C 05 A1 A9   88 C5 EC 01 F2 C4 7E 0D  ...b,...........
#     0020: E7 F4 4D BF 87 28 A4 F2   8B 77 60 DD 11 2F FE BD  ..M..(...w`../..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.108 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:02.164 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "6B 9C F1 EA 57 FC C6 DC 8C 41 64 FA 86 75 3E 1B F9 2A F5 42 99 08 FC 84 99 0E D8 B6 09 DC D5 99",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.201 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.202 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.202 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 15:45:02.202 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-19 15:45:02.478 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 15:45:02.479 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 15:45:13.965; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:14.314 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4C 79 A3 74",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:36.000 UTC",
#       "not  after"         : "2024-01-17 15:44:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 15 67 7F B5 0A F8 0E 04   E3 FA EF 97 9F 3C 72 E1  .g...........<r.
#           0010: 6A 36 1C 76                                        j6.v
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 6B CB 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 15:44:33.000 UTC",
#       "not  after"         : "2024-01-17 15:44:33.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9F 45 FA 6D 4A 8F 7E 83   5B 1C 30 12 0B 68 4E 3C  .E.mJ...[.0..hN<
#           0010: E0 E5 42 2E                                        ..B.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 15:45:14.327 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:14.485 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.485 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:14.488 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 15:45:14.488 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.492 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.503 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.503 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.503 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 15:45:14.505 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C4 3D CF BD DD B9 AA 99 33 3E 0F 57 B0 0A 52 06 1E CC BD C2 6D C4 97 AD BF 1B 07 57 15 BD B6 E1",
#     "session id"          : "EE D1 B9 82 D8 11 02 26 0E 42 68 03 C7 D4 36 B0 AA 2B 59 57 79 1D 9E A7 51 61 D4 4F 64 D8 19 F3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: EB E6 32 CC FA D1 43 47   C0 23 CA A0 64 27 FA FC  ..2...CG.#..d'..
#               0010: 08 A7 53 59 AC E2 E5 13   DF 49 72 83 6C E1 7F 0E  ..SY.....Ir.l...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "43 3C C0 E8 92 E8 55 33 C1 12 C2 A6 C2 E3 2F 2D 44 16 FB 71 08 F6 E7 1C A7 B6 4A C8 8E 97 49 BC",
#     "session id"          : "EE D1 B9 82 D8 11 02 26 0E 42 68 03 C7 D4 36 B0 AA 2B 59 57 79 1D 9E A7 51 61 D4 4F 64 D8 19 F3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 35 25 2E 68 12 14 B8 08   AB 5D F1 15 3F 6C 65 D0  5%.h.....]..?le.
#             0010: D8 BF B5 9E 48 16 BF DC   01 C3 D3 A6 BA CC B0 2E  ....H...........
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.522 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.523 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.525 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.526 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.532 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.534 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.535 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 15:45:14.538 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions hands

[...truncated too long message...]

pl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14536ms
ok 78 stop command for single port in 17486ms
not ok 79 status detects locally running solr in 1535ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7490ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1525ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3020ms
ok 83 copying files around in 6581ms
ok 84 upconfig in 2584ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1247ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1248ms
not ok 87 Cleanup in 2500ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 3s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/huduz46q6gnru

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8221 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8221/

All tests passed

Build Log:
[...truncated 1476 lines...]
BUILD FAILED in 1h 1m 34s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/7zuyr6vafsynm

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8220 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8220/

All tests passed

Build Log:
[...truncated 1263 lines...]
# ERROR: Error from server at http://localhost:33669/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16323ms
ok 60 Check help command in 4829ms
ok 61 basic post with a type specified in 5850ms
ok 62 basic post WITHOUT a type specified in 11494ms
ok 63 crawling a directory in 4638ms
ok 64 crawling a web site in 4589ms
ok 65 commit and optimize and delete in 3836ms
ok 66 args mode in 6432ms
ok 67 stdin mode in 3308ms
ok 68 post solr log into solr via script in 10186ms
ok 69 post solr log into solr via cli in 7089ms
ok 70 allowPaths - backup in 16274ms
ok 71 start solr with ssl in 19119ms
not ok 72 use different hostname when not checking peer-name in 20566ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 33669 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33669 (pid=281217). Happy searching!
#
#     INFO  - 2023-10-19 10:46:20.895; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:46:20.900; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:46:21.378; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 10:46:21.501; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 10:46:21.501; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 10:46:31.423; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 10:46:31.428; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 10:46:31.792; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:33669/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 10:46:33.231; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:46:33.235; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:33669/solr] to [https://127.0.0.1:33669].
# WARN  - 2023-10-19 10:46:34.069; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 10:46:34.106; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16894ms
ok 74 start solr with client truststore and security manager in 20073ms
not ok 75 start solr with mTLS needed in 51663ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-inB6hc/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33669 [|]   [/]   [-]   [\]
# Started Solr server on port 33669 (pid=283958). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33670 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]
# Started Solr server on port 33670 (pid=284065). Happy searching!
#
#     INFO  - 2023-10-19 10:47:37.089; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:47:37.100; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:47:37.633; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:37.635; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:37.636; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:38.119 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 CB 36 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:22.000 UTC",
#     "not  after"         : "2024-01-17 10:47:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#         0010: E3 90 C4 1B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:38.123 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 C8 8A B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:14.000 UTC",
#     "not  after"         : "2024-01-17 10:47:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:38.155 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:38.484 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.485 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:38.489 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:38.490 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.494 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.507 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.507 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:38.509 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "52 A4 87 C4 A0 22 69 1C CD 20 A7 E6 5B AE B0 F6 9F FA F2 1C 91 4F EF 44 80 52 EE C2 AC 02 24 C9",
#   "session id"          : "A6 3F FB 15 75 BC 74 44 31 0C FD FE ED E3 E0 93 FB CD F0 D7 A4 0B 47 DD 73 D0 ED 34 4E 9C 3C 1D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 59 49 FC C3 0A 04 18 07   FB F7 0F 4F 79 47 BB B8  YI.........OyG..
#             0010: 90 58 0E E9 35 4B 5C A9   90 DA 70 FF B8 0D 28 1A  .X..5K\...p...(.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.684 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "CB E3 7D 6F 3D 44 AD F9 7B 45 E1 8A 8C DA A5 22 A8 D2 CC 5B 4C 7B 55 94 CD 80 C4 85 0C F6 D6 39",
#   "session id"          : "A6 3F FB 15 75 BC 74 44 31 0C FD FE ED E3 E0 93 FB CD F0 D7 A4 0B 47 DD 73 D0 ED 34 4E 9C 3C 1D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 7C 7D 22 45 75 5E 8C 9B   8B AD 22 E2 57 37 25 21  .."Eu^....".W7%!
#           0010: 5C 4C 8C 3D BE C9 40 A0   88 D4 93 8C 7A D6 B9 75  \L.=..@.....z..u
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.684 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.684 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.685 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.686 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.687 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.687 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.692 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.693 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.706 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.710 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.711 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.714 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.714 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.715 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.716 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.716 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.716 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.717 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.717 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.718 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.728 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.731 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 09 A4 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:18.000 UTC",
#       "not  after"         : "2024-01-17 10:47:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 9F 68 EE A5 4B EE B9   8B 57 47 FD 68 75 D3 98  ..h..K...WG.hu..
#           0010: 88 3B 98 3B                                        .;.;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.731 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.819 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.831 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 32 47 CF 3F 11 C2 1C 81   F2 BA 22 87 85 90 1C 45  2G.?......"....E
#     0010: 79 E2 A9 D4 A5 6A CC 1B   73 4D EE C0 BA CE F7 D8  y....j..sM......
#     0020: A7 5F 93 B4 24 4C B0 30   AF 03 D8 C8 99 3D 64 D0  ._..$L.0.....=d.
#     0030: FE 48 1F A2 B4 29 4D ED   9B 32 B5 47 2B D8 B4 85  .H...)M..2.G+...
#     0040: F7 DE 07 66 E3 4D B9 9B   76 AC 60 6B 49 AE 5D C0  ...f.M..v.`kI.].
#     0050: 35 98 68 31 1F 1E 9B FB   A4 62 82 E5 C6 A6 94 DD  5.h1.....b......
#     0060: 6D 3E 4A 32 8D 9B BF DD   16 7D 79 5D 2E 79 AE 76  m>J2......y].y.v
#     0070: 6D 11 F9 B7 74 CC 7B 10   C6 3C D3 A5 19 2A B9 2C  m...t....<...*.,
#     0080: E8 B4 D3 94 69 95 C9 79   25 8C 02 0F 2B 41 3D FD  ....i..y%...+A=.
#     0090: C1 4D 7A 1B A9 E6 38 91   F8 78 7C 81 72 37 7D 48  .Mz...8..x..r7.H
#     00A0: 0D E1 9D 50 35 10 24 C8   84 FB 72 9F 8D 93 36 08  ...P5.$...r...6.
#     00B0: 87 5E F3 EA 1B 23 B9 49   F9 ED 21 03 AB 49 35 69  .^...#.I..!..I5i
#     00C0: 8E 60 1C 09 D5 DB 9C 62   3F D3 EF BA 6E EB 33 BF  .`.....b?...n.3.
#     00D0: 4D 04 4C 3E 8F F3 89 D0   A3 29 33 BE DB E0 ED D2  M.L>.....)3.....
#     00E0: F3 85 47 F0 BF 27 05 FE   73 6A E7 88 3A 83 19 B5  ..G..'..sj..:...
#     00F0: 89 EB 34 74 C3 5B F7 99   73 9B 50 D6 14 3D 71 64  ..4t.[..s.P..=qd
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.835 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BD 29 34 BC 63 81 EE 0B   9F AF CF D2 6A 7A E9 89  .)4.c.......jz..
#     0010: 06 CA E8 EF 2C 64 36 C5   AF C8 62 8F 89 7B DA B9  ....,d6...b.....
#     0020: 37 85 2C 71 71 3D 16 F0   17 15 9D 20 3E 1B C0 20  7.,qq=..... >..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.840 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:38.842 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.842 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:38.842 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:38.843 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.261 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 CB 36 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:22.000 UTC",
#       "not  after"         : "2024-01-17 10:47:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#           0010: E3 90 C4 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 66 AF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:16.000 UTC",
#       "not  after"         : "2024-01-17 10:47:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.325 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8F E6 6F C7 6F 1B 45 F4   57 01 64 9B C2 89 00 08  ..o.o.E.W.d.....
#     0010: FC 04 CF ED 93 A8 49 A2   89 D0 CD CD C1 79 FE 03  ......I......y..
#     0020: B3 F5 5E 5C 19 7D FF 68   A7 CA 40 33 7B AF D2 34  ..^\...h..@3...4
#     0030: 59 C4 44 77 24 5E 61 E0   7C E4 CE A0 85 E5 10 8F  Y.Dw$^a.........
#     0040: 5E ED 02 83 6E 04 5A 0F   24 88 85 7A 98 52 2B DE  ^...n.Z.$..z.R+.
#     0050: 56 3B 09 C8 6E FE 35 91   AC 03 54 E5 C2 D1 BC C3  V;..n.5...T.....
#     0060: 4C C3 9F 51 32 5C 19 2B   BD 3C 20 61 90 22 18 95  L..Q2\.+.< a."..
#     0070: 16 1E 8A 88 79 98 A8 3D   06 9D D0 7A 1E 41 BF 8A  ....y..=...z.A..
#     0080: E0 22 9D 1B D0 E3 2D C5   AD 44 55 30 C6 C2 2C 93  ."....-..DU0..,.
#     0090: C8 18 B5 B7 DA 00 5C 1E   9E 4B BE D8 8E 98 2D 36  ......\..K....-6
#     00A0: 59 01 82 35 4A 3D E7 57   79 75 0E 12 FE 55 A1 8C  Y..5J=.Wyu...U..
#     00B0: 1E 13 53 D0 B0 09 A1 25   9F C7 B5 6B 2E A7 3A 49  ..S....%...k..:I
#     00C0: 9B 11 54 25 64 9F F7 65   CA A0 3E 32 78 96 35 1D  ..T%d..e..>2x.5.
#     00D0: 48 F9 E9 E1 86 2D CE C8   15 B2 26 99 E4 65 46 98  H....-....&..eF.
#     00E0: EE 53 2E D2 7D 69 6E CF   46 F5 93 87 E3 BC 39 C2  .S...in.F.....9.
#     00F0: A9 B2 09 80 C6 40 60 59   53 C6 2F 9C 1A FB 5D EF  .....@`YS./...].
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.329 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D5 D0 F4 E1 87 14 A8 B1   82 D9 43 82 56 03 92 6D  ..........C.V..m
#     0010: 1F 11 AD 9F B4 B5 19 09   6D F5 A7 67 C5 8E 44 97  ........m..g..D.
#     0020: 1F 42 5F A4 56 AF 1E E0   27 E3 9F 56 F8 4C CE 9D  .B_.V...'..V.L..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:39.333 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-19 10:47:39.408 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "12 ED 3E BA 28 1D 8A DB DC 65 14 ED 27 15 D6 48 87 18 9A 50 5A 92 9C 6C 5B 75 49 C1 F9 53 B2 54",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 10:47:39.731 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 10:47:39.732 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-19 10:47:39.736 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine
# javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-19 10:47:39.737 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify (
# "throwable" : {
#   javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133)
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
#   	at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769)
#   	at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#   	at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#   	at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155)
#   	at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
# INFO  - 2023-10-19 10:47:40.853; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 10:47:40.857; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 10:47:41.179; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:41.181; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 10:47:41.181; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-inB6hc/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:41.215 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 CB 36 7A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:22.000 UTC",
#     "not  after"         : "2024-01-17 10:47:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#         0010: E3 90 C4 1B                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:41.219 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "41 C8 8A B7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:14.000 UTC",
#     "not  after"         : "2024-01-17 10:47:14.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:41.231 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:41.393 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.394 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:41.395 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:41.395 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.400 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.411 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.411 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.411 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:41.413 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "08 F7 BE 37 A8 66 14 CD 02 1D D9 FE B8 34 E1 C9 0D 13 FE D0 97 7F DA DA B6 0D 94 36 53 28 50 22",
#   "session id"          : "1F DE 15 6C 08 F5 46 42 77 66 30 B2 E4 0E CA 79 62 77 0A A1 EC 6A DD 58 8A F8 2A B2 CD FA 9F 68",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 9C 41 EC AB 28 A2 44 DF   47 DA 5F 3E 20 70 0E 88  .A..(.D.G._> p..
#             0010: 5C D9 CA 10 4E B8 44 65   75 78 7B 9A 11 8E 4A 20  \...N.Deux....J
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.892 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "A8 FC 50 D0 B5 6A 16 21 98 81 A8 00 5D D8 11 51 D0 17 CE AF 36 8C 66 9F 1E B0 28 7A 09 3B F6 6E",
#   "session id"          : "1F DE 15 6C 08 F5 46 42 77 66 30 B2 E4 0E CA 79 62 77 0A A1 EC 6A DD 58 8A F8 2A B2 CD FA 9F 68",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 23 72 32 DB 05 36 FC BD   F4 22 8D 7C 40 79 BE 80  #r2..6..."..@y..
#           0010: 28 48 73 84 0F 08 5E 73   48 14 32 91 06 D8 90 7D  (Hs...^sH.2.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.892 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.892 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.893 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.897 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.901 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.902 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.927 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.929 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.930 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.939 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.939 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.944 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.944 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.946 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.947 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.948 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:41.948 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.956 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2E 09 A4 4E",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:18.000 UTC",
#       "not  after"         : "2024-01-17 10:47:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 9F 68 EE A5 4B EE B9   8B 57 47 FD 68 75 D3 98  ..h..K...WG.hu..
#           0010: 88 3B 98 3B                                        .;.;
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:41.959 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 10:47:42.002 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.035 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "62 66 AF F8",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 10:47:16.000 UTC",
#     "not  after"         : "2024-01-17 10:47:16.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#         0010: ED EC 39 F7                                        ..9.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#         0010: A8 3E 5E 3D                                        .>^=
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.037 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 4A D6 B0 FE A7 63 B7 CC   F8 99 50 99 EB 64 FE A3  J....c....P..d..
#     0010: 60 23 73 61 39 1C 08 1B   CD BD 2C 07 37 78 FA D9  `#sa9.....,.7x..
#     0020: 3B 6D BC C3 68 3D 4A 1B   AF 39 D1 AA FF DF AF C2  ;m..h=J..9......
#     0030: 7F 96 56 56 7E 9C 71 D4   6D 15 ED 6F AC C3 21 01  ..VV..q.m..o..!.
#     0040: 6C B5 7F BC 13 DB 27 61   3E F1 EA CA 0A 15 FA C5  l.....'a>.......
#     0050: 59 E6 4D 33 F2 3D D0 97   16 CE CF D8 E8 1D AF D3  Y.M3.=..........
#     0060: 19 A8 54 3E 19 C9 03 DC   1D 93 4D A1 CF 5C E3 D3  ..T>......M..\..
#     0070: C9 90 7B 12 FC C7 74 32   33 B9 97 C5 6C E1 6A BA  ......t23...l.j.
#     0080: A9 6B 36 47 DE 78 58 D9   1D C6 20 78 CA 64 B0 7F  .k6G.xX... x.d..
#     0090: 28 A0 AD 50 9E 20 8F C6   7D 1D 84 E3 60 5B 93 3E  (..P. ......`[.>
#     00A0: C3 AF 0A 97 BE 0D B9 1E   0C 11 23 C8 28 6C 04 B0  ..........#.(l..
#     00B0: 97 A5 B7 F7 A1 35 B2 C3   98 17 68 E4 3C D3 05 D9  .....5....h.<...
#     00C0: 86 3C 77 9C 2C EC 8D F5   69 26 B9 34 92 D2 2B DE  .<w.,...i&.4..+.
#     00D0: 89 9B A6 16 A8 F6 C2 09   BA CE 65 E7 D7 87 0C BF  ..........e.....
#     00E0: 5E 01 6D 34 B6 5D C5 4E   D6 02 DE 9E B0 17 33 A2  ^.m4.].N......3.
#     00F0: 53 56 A7 BA 06 96 42 86   14 8C 4E 29 4A AB A6 E9  SV....B...N)J...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.039 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2D C5 D5 01 31 4C 38 04   5E 1D D0 3F B8 AF C0 77  -...1L8.^..?...w
#     0010: 28 BD 9B BE 7E FE 65 16   C1 AA 36 4A FA 37 30 89  (.....e...6J.70.
#     0020: A1 AC 9E D6 78 D9 3C 9E   49 82 A6 E6 B7 79 B6 AE  ....x.<.I....y..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.040 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 10:47:42.041 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 10:47:42.042 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.042 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.044 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 CB 36 7A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:22.000 UTC",
#       "not  after"         : "2024-01-17 10:47:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E2 0A 17 EE 2C 88 63 48   2C 18 35 2B D8 FD 6D 5D  ....,.cH,.5+..m]
#           0010: E3 90 C4 1B                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 66 AF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:16.000 UTC",
#       "not  after"         : "2024-01-17 10:47:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.067 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1C AE 0B 70 09 82 04 E6   60 88 F9 1A 09 F4 32 07  ...p....`.....2.
#     0010: 9C A9 E7 D6 27 48 B8 C7   5D E9 0B F2 C2 8B 8B EF  ....'H..].......
#     0020: 93 07 75 16 F2 C6 AA 43   CD 4A 1A 93 7B C8 B5 E8  ..u....C.J......
#     0030: EB 7E 2B FD 23 E1 73 F3   AE A0 67 47 03 2F 25 F7  ..+.#.s...gG./%.
#     0040: 27 61 1A 1D 95 6C D2 2B   6C 80 73 82 51 8F 03 16  'a...l.+l.s.Q...
#     0050: 3B 95 F5 5F D4 09 61 CC   60 BC DA 88 79 F2 1E 0F  ;.._..a.`...y...
#     0060: E6 C4 5E 2B AA C8 B5 53   82 28 04 CC 7F E1 A2 91  ..^+...S.(......
#     0070: 28 C0 0F 77 6B 1D 5A 96   FF 0C 23 F2 A4 7F 30 51  (..wk.Z...#...0Q
#     0080: E1 B7 D4 D6 59 EC 99 81   50 9E 15 67 00 C2 DC 69  ....Y...P..g...i
#     0090: 85 B6 5C E3 29 C5 ED 5A   AC 2B 5D 8D BD FD 7A A6  ..\.)..Z.+]...z.
#     00A0: F8 39 9F F1 D2 E5 AB 01   84 14 2B E8 6A E1 BD 25  .9........+.j..%
#     00B0: CB D9 D4 F9 31 20 BF A6   F5 2F 0E 84 0E FA B8 B0  ....1 .../......
#     00C0: 80 E0 5D 93 AD E2 66 E0   F3 03 5C 6D 92 63 44 D0  ..]...f...\m.cD.
#     00D0: 2D 74 00 F2 B8 27 8D D2   B4 2B 18 67 69 67 70 D0  -t...'...+.gigp.
#     00E0: 0F 1A D6 6B 79 44 55 C4   22 EB 35 3F 66 D5 D3 4D  ...kyDU.".5?f..M
#     00F0: 88 83 39 DF D0 3F C1 E0   1C 67 A5 35 7C B4 AF AD  ..9..?...g.5....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.068 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 94 43 8C 88 1F 97 CD AD   25 D5 5C 58 38 41 B0 0C  .C......%.\X8A..
#     0010: C0 B8 C7 FB CC AA 75 7B   CA F9 38 F8 02 9B 7F E2  ......u...8.....
#     0020: 12 F5 75 12 30 BE 59 B6   F3 4F 77 FD 0A 96 55 78  ..u.0.Y..Ow...Ux
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.069 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:42.124 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "43 77 DF 85 64 EF 54 A1 E8 32 A0 D7 61 00 9D 3A 55 F2 F4 B2 3F F1 0A 4F D4 79 0A C4 23 D6 E2 DE",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 10:47:42.384 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 10:47:42.385 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-19 10:47:55.850; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:56.169 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 66 AF F8",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:16.000 UTC",
#       "not  after"         : "2024-01-17 10:47:16.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9B 9A 70 11 E0 48 80 2B   D0 03 80 DF 34 A6 F5 98  ..p..H.+....4...
#           0010: A8 3E 5E 3D                                        .>^=
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "41 C8 8A B7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 10:47:14.000 UTC",
#       "not  after"         : "2024-01-17 10:47:14.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 81 3C 84 36 AA 9C 84 78   D3 88 D2 74 B7 4F E1 AA  .<.6...x...t.O..
#           0010: ED EC 39 F7                                        ..9.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 10:47:56.182 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:56.400 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.400 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:56.402 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 10:47:56.402 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.406 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.417 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.417 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.417 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 10:47:56.419 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "0A 49 EB 31 3F 1A AB 89 EB D1 11 80 EA B8 B8 52 75 08 80 24 24 B6 D1 AA E1 1E 99 AB 17 D0 A3 D1",
#     "session id"          : "88 8C A3 6D E3 6A 99 FA DF BF 03 40 22 00 BE 87 CE F9 47 6A 75 D1 A4 98 E7 6F 46 62 57 2D F5 77",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 6B 79 85 2B DD 69 0C D2   17 6A 7C 0E 97 26 4F D3  ky.+.i...j...&O.
#               0010: 4B CD 31 A4 68 E4 2A 22   73 6F 62 F3 89 45 B1 0E  K.1.h.*"sob..E..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.438 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "09 4E 29 9C 5E 04 FE 9A B9 55 40 6D 5E 9A 06 67 98 E5 BB 64 2D 45 9B DE 37 DA EA 64 AD 71 7E C9",
#     "session id"          : "88 8C A3 6D E3 6A 99 FA DF BF 03 40 22 00 BE 87 CE F9 47 6A 75 D1 A4 98 E7 6F 46 62 57 2D F5 77",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 44 82 59 8C 61 D4 32 E8   EE 5C 7F C4 FA E7 F9 FC  D.Y.a.2..\......
#             0010: F5 34 D8 63 64 98 FF 62   56 E9 1F 89 3E 5B 05 5F  .4.cd..bV...>[._
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.439 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 10:47:56.440 UTC|SSLExtensions.java:192|Consume

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14234ms
ok 78 stop command for single port in 18005ms
not ok 79 status detects locally running solr in 1474ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7385ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1462ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2537ms
ok 83 copying files around in 7054ms
ok 84 upconfig in 2540ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1233ms
not ok 87 Cleanup in 2498ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 22s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/5vkpepstawt6a

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8219 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8219/

All tests passed

Build Log:
[...truncated 1262 lines...]
# ERROR: Error from server at http://localhost:33215/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16444ms
ok 60 Check help command in 4752ms
ok 61 basic post with a type specified in 5992ms
ok 62 basic post WITHOUT a type specified in 12080ms
ok 63 crawling a directory in 4636ms
ok 64 crawling a web site in 5628ms
ok 65 commit and optimize and delete in 3898ms
ok 66 args mode in 6475ms
ok 67 stdin mode in 3489ms
ok 68 post solr log into solr via script in 12293ms
ok 69 post solr log into solr via cli in 7737ms
ok 70 allowPaths - backup in 17387ms
ok 71 start solr with ssl in 19031ms
not ok 72 use different hostname when not checking peer-name in 20639ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 33215 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33215 (pid=4180863). Happy searching!
#
#     INFO  - 2023-10-19 08:31:11.406; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:31:11.411; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 08:31:11.844; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@423e4cbb(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 08:31:11.924; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 08:31:11.925; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 08:31:22.013; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 08:31:22.017; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 08:31:22.421; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:33215/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 08:31:23.807; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:31:23.811; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:33215/solr] to [https://127.0.0.1:33215].
# WARN  - 2023-10-19 08:31:24.618; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 08:31:24.668; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17730ms
ok 74 start solr with client truststore and security manager in 19795ms
not ok 75 start solr with mTLS needed in 53864ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-nXfFIr/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 33215 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33215 (pid=4183549). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 33216 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 33216 (pid=4183719). Happy searching!
#
#     INFO  - 2023-10-19 08:32:27.933; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:32:27.942; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 08:32:28.497; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@c7a975a(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:28.499; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@77192705(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:28.499; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(ca,h=[localhost],a=[],w=[]) for Client@475835b1[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:28.565 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B CA 2C 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:14.000 UTC",
#     "not  after"         : "2024-01-17 08:32:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#         0010: 4B EA B1 C5                                        K...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:28.568 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 F7 25 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:05.000 UTC",
#     "not  after"         : "2024-01-17 08:32:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:28.582 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.962 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.963 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.963 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 08:32:28.963 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:29.083 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.083 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:29.085 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:29.085 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.090 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.104 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.104 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.107 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:29.114 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "27 B0 A0 F2 CA 10 49 66 2A CD 9E 18 0E 10 33 AC 11 A7 FB 16 95 4F FB 11 AA 25 5A 3A 6F 9B 75 90",
#   "session id"          : "CD 7B 54 91 26 26 67 B7 E3 64 A4 C1 8C 3F 00 CA CD 51 88 5A C9 C2 BD 65 2A 9E 2D BE 3E 31 9D 92",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 83 FE AF 82 E3 1E 32 CB   32 C5 AD 9A 11 28 F2 FD  ......2.2....(..
#             0010: BF 3A 10 4F C8 03 FF CA   B7 B4 83 78 CC 01 BC 43  .:.O.......x...C
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.673 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F5 58 CD 02 C8 84 A5 D8 D1 4B 23 F9 58 01 27 73 9E DD F2 5D 93 34 B7 EE C3 BD FD E6 96 D0 DA E0",
#   "session id"          : "CD 7B 54 91 26 26 67 B7 E3 64 A4 C1 8C 3F 00 CA CD 51 88 5A C9 C2 BD 65 2A 9E 2D BE 3E 31 9D 92",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CE 57 EB 41 0D 69 B1 7F   06 E4 B4 A5 3D 9A A3 20  .W.A.i......=..
#           0010: 8D A2 9B F5 5E 7F DC C1   CF 0F D4 CC 5E 43 E5 6F  ....^.......^C.o
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.673 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.674 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.676 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.677 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.682 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.682 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.683 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.683 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.687 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.688 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.708 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.710 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.725 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.729 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.730 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.730 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.732 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.733 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.734 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.734 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.736 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E E5 0A 09",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:10.000 UTC",
#       "not  after"         : "2024-01-17 08:32:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 25 62 26 72 C1 22 BD   4E D0 9B 3A 1B 24 9B 36  A%b&r.".N..:.$.6
#           0010: A6 39 ED 37                                        .9.7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.736 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.823 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.827 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 17 4A 37 16 19 D5 17 0B   0D 38 C7 A4 CD A5 86 C3  .J7......8......
#     0010: 2B 64 29 E3 32 3B C4 5B   A3 67 3B 92 1B 56 B1 AA  +d).2;.[.g;..V..
#     0020: 30 86 4F B3 B6 BB F8 07   25 C6 13 57 16 99 92 38  0.O.....%..W...8
#     0030: E5 55 BC 6C 71 CD 84 28   9F AA 03 DE B9 14 4E 87  .U.lq..(......N.
#     0040: A9 45 E4 61 A9 8E C5 6C   06 D5 19 47 4C 9E FD B5  .E.a...l...GL...
#     0050: 81 BA 2B 9C EF 15 58 D9   77 45 47 2E F2 D8 B1 10  ..+...X.wEG.....
#     0060: 31 69 21 45 36 AA CA 63   F8 01 D9 7D 31 A1 D9 D5  1i!E6..c....1...
#     0070: 58 A0 54 00 DD 45 BD 3A   DB CF D5 A0 A0 9E 68 31  X.T..E.:......h1
#     0080: 4A 95 5D 87 68 25 3E 71   D9 2B AF 07 26 F7 C4 7C  J.].h%>q.+..&...
#     0090: 0D 8F 0C 9C 6D 78 78 CF   03 1B A1 79 3F FE AE CD  ....mxx....y?...
#     00A0: E5 45 6C 9D 96 5C 2C 71   82 E3 3A 39 10 AA 64 88  .El..\,q..:9..d.
#     00B0: CA BB C2 5B 2E 7A ED AC   77 79 95 AB D7 DA 22 0D  ...[.z..wy....".
#     00C0: 66 48 09 9B E7 5E B6 E8   6F FA 58 EF B7 A6 70 B2  fH...^..o.X...p.
#     00D0: C9 33 AC 61 1A 28 DF DE   9E D4 5C 9C BA 26 B1 BC  .3.a.(....\..&..
#     00E0: EB C6 8D FA F6 3C 1C 3F   F1 19 F6 15 11 B5 41 5B  .....<.?......A[
#     00F0: 96 7C 3D 57 18 F6 0D 16   96 23 C5 5E 92 82 4F 7B  ..=W.....#.^..O.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.834 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D0 98 19 F8 50 CF 66 DC   BF DE ED E7 F9 90 9F 1B  ....P.f.........
#     0010: 0A 59 5F F6 9F EC AD A3   D0 5B FB C2 94 1E 71 C2  .Y_......[....q.
#     0020: 10 61 AD C1 64 0F 8E B0   38 7C F5 65 C7 03 FC BC  .a..d...8..e....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.837 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.840 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:29.841 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:29.841 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:29.841 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.240 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B CA 2C 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:14.000 UTC",
#       "not  after"         : "2024-01-17 08:32:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#           0010: 4B EA B1 C5                                        K...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D7 0B 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:07.000 UTC",
#       "not  after"         : "2024-01-17 08:32:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.308 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 78 34 EE 65 C9 02 88 CE   44 EB 6C 90 66 89 A9 D7  x4.e....D.l.f...
#     0010: AA A0 64 95 7B 16 8A A5   D3 E1 25 16 F4 A7 4A 69  ..d.......%...Ji
#     0020: DC A5 9C 25 E2 A8 B3 A1   FF 63 5F 33 F6 F9 32 DB  ...%.....c_3..2.
#     0030: FA 4A 8E D6 BF 47 34 0F   9A E4 76 49 79 4F CF D2  .J...G4...vIyO..
#     0040: 3B B2 5C E1 08 3B 72 2F   9B FA 01 F0 EC 96 1E F4  ;.\..;r/........
#     0050: 24 7C B5 60 FF 19 6B C9   93 23 78 DD 94 64 AD 31  $..`..k..#x..d.1
#     0060: 1F AE A0 58 56 8D 72 BB   84 A3 2F C0 A4 A9 09 C4  ...XV.r.../.....
#     0070: 4E 85 38 0F 07 C4 CC 34   70 C4 9E 29 17 F9 1E DB  N.8....4p..)....
#     0080: 38 B3 A5 FC DA 8D F4 BA   DF 06 EF 3C C0 F7 F7 00  8..........<....
#     0090: 95 21 0A 84 99 74 92 72   C6 E9 42 A9 46 6F 85 61  .!...t.r..B.Fo.a
#     00A0: B3 1F 3A 6C C7 06 C8 E4   01 EF 84 F2 36 71 1F F3  ..:l........6q..
#     00B0: 44 67 9B F3 A9 BF 7D F2   A1 D4 0F 1E 13 E7 0C 71  Dg.............q
#     00C0: E8 70 47 6B CF 55 02 DE   76 60 A8 0E 38 B3 77 83  .pGk.U..v`..8.w.
#     00D0: EB F2 4B DD 5E 57 FA 75   18 E8 9C DD 53 CF 0B 66  ..K.^W.u....S..f
#     00E0: 92 58 A4 24 C7 85 D7 53   F3 CB 9B AE 6B EA EA E4  .X.$...S....k...
#     00F0: 2E 3F A7 0D FE 4E A5 4C   4E 6E AE 7C 08 50 3F B0  .?...N.LNn...P?.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.310 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C3 C3 8A B0 28 45 CD 84   4E 85 BA 32 FF 4F 21 0F  ....(E..N..2.O!.
#     0010: 06 2A F2 E9 43 1A 72 B9   44 50 54 D1 53 DE 83 0B  .*..C.r.DPT.S...
#     0020: CB 78 28 28 9B 53 8C 31   7E C1 4D 54 80 E7 52 0F  .x((.S.1..MT..R.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.314 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:30.394 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "9C 35 B1 B8 8A 5D 5D 5A 81 A0 C0 DC 56 70 3E 48 F9 3E C3 57 CA 2F 7D 8D 10 14 A5 BB 8E 95 A5 07",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 08:32:30.800 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 08:32:30.801 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 08:32:32.373; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 08:32:32.379; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 08:32:32.956; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:32.958; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 08:32:32.958; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-nXfFIr/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:32.990 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1B CA 2C 23",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:14.000 UTC",
#     "not  after"         : "2024-01-17 08:32:14.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#         0010: 4B EA B1 C5                                        K...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:32.994 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 F7 25 9A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:05.000 UTC",
#     "not  after"         : "2024-01-17 08:32:05.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:33.006 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:33.175 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.175 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:33.176 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:33.176 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.181 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.191 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.191 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:33.194 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "BD 2A C8 21 1E AA 92 25 B5 8F 78 C2 47 47 96 41 51 0E 9C F2 C2 E3 3F 39 32 2A 09 F0 D5 6E 30 B6",
#   "session id"          : "E2 DC C3 B4 2D 2A F0 2F 8F C2 01 C0 F9 5C DE C4 BD 48 CE 35 36 A8 D6 ED 88 BB F4 1D 8C B5 10 69",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B3 7B F7 D6 4E 23 25 F8   16 C1 52 2F 5A D0 0C 01  ....N#%...R/Z...
#             0010: EB 9D 8D 52 5E 16 A6 B1   1B DD 2D 9B 71 68 64 6A  ...R^.....-.qhdj
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.343 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "4B 59 DE 59 26 E0 93 A8 AB 29 B3 5B FA 1B 4C 11 4D FE CB 49 FD F0 48 B5 96 A9 37 7A 2A 26 47 3F",
#   "session id"          : "E2 DC C3 B4 2D 2A F0 2F 8F C2 01 C0 F9 5C DE C4 BD 48 CE 35 36 A8 D6 ED 88 BB F4 1D 8C B5 10 69",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 53 73 EB BC 68 11 F8 C6   06 2F 2F ED A3 02 85 86  Ss..h....//.....
#           0010: 01 53 CC 3E AF 33 E3 5D   21 0F EB 41 49 33 5C 3E  .S.>.3.]!..AI3\>
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.344 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.344 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.346 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.350 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.351 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.351 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.371 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.376 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.376 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.377 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.378 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.393 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.395 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.402 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.405 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.406 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.406 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.409 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.409 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.409 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.410 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.410 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.410 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.412 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.412 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.413 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.415 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.416 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.416 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.417 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.420 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1E E5 0A 09",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:10.000 UTC",
#       "not  after"         : "2024-01-17 08:32:10.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 41 25 62 26 72 C1 22 BD   4E D0 9B 3A 1B 24 9B 36  A%b&r.".N..:.$.6
#           0010: A6 39 ED 37                                        .9.7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.420 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.474 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D7 0B 6B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 08:32:07.000 UTC",
#     "not  after"         : "2024-01-17 08:32:07.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#         0010: 87 22 12 8F                                        ."..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#         0010: F6 8D 00 99                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.478 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 2F 3D 75 F4 CA EC 13 BF   49 B1 79 BE 77 5F 79 95  /=u.....I.y.w_y.
#     0010: C6 4E D2 ED 13 85 66 DD   4E ED 6B FC FB C2 24 A4  .N....f.N.k...$.
#     0020: 20 5D 5E 52 08 BD F9 D6   05 26 F1 B3 31 04 F0 AA   ]^R.....&..1...
#     0030: C5 8D BA 35 B7 4B CE 46   EB 98 A8 10 68 1B E7 9B  ...5.K.F....h...
#     0040: DF 25 7A B4 93 98 74 56   78 07 A7 A6 92 E5 92 C4  .%z...tVx.......
#     0050: 99 BD 5F EC 9B 12 B8 C3   A6 F9 1F 56 9C A3 DB ED  .._........V....
#     0060: 3D A3 33 B8 30 04 AC D5   9A 2E 9B 28 5D 88 2A 58  =.3.0......(].*X
#     0070: B9 7F F4 F5 34 BF 00 CD   7F 71 7C A6 3A 95 8A 36  ....4....q..:..6
#     0080: 5A CF 07 CA 09 31 A2 1F   DC F3 C0 13 DA 96 AE 0C  Z....1..........
#     0090: CA 96 E6 80 71 1E B8 D5   AE E3 92 02 27 CD 12 9B  ....q.......'...
#     00A0: C8 A9 28 43 24 37 AE 05   93 BD B2 40 93 FD F6 30  ..(C$7.....@...0
#     00B0: DC A3 16 92 FB 47 DB E5   6F 22 E6 0B 81 36 50 AB  .....G..o"...6P.
#     00C0: 16 59 51 5E BF 8E 5C B4   3D EC 93 44 A1 19 B7 64  .YQ^..\.=..D...d
#     00D0: F2 8E 7E 9D CE B2 4E 44   07 F5 BF DA 76 42 27 99  ......ND....vB'.
#     00E0: E3 22 BC 1E 63 B5 61 46   0F 78 4F 42 1D 62 CF 94  ."..c.aF.xOB.b..
#     00F0: 7F 9C BC 05 7F D7 58 D8   96 DE 28 BD F0 C1 53 3E  ......X...(...S>
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.480 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C8 ED 85 7B 7D 0F 2E 8F   46 45 FE 6A 4D CE C2 DC  ........FE.jM...
#     0010: B2 9F B6 5D 53 B6 6A 84   4E A7 83 4F F9 23 BA EE  ...]S.j.N..O.#..
#     0020: B5 DD 08 A9 77 29 A2 DC   8F BE F7 9E 62 82 82 33  ....w)......b..3
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.481 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:33.482 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.482 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:33.482 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.483 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.485 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1B CA 2C 23",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:14.000 UTC",
#       "not  after"         : "2024-01-17 08:32:14.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4B 2D 44 96 87 FD 3A 4F   A9 DC 35 69 74 7F 62 4D  K-D...:O..5it.bM
#           0010: 4B EA B1 C5                                        K...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D7 0B 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:07.000 UTC",
#       "not  after"         : "2024-01-17 08:32:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.508 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 88 FF AD B0 28 EE 57 EA   AB DA A9 55 7C 45 B7 8F  ....(.W....U.E..
#     0010: C4 15 E9 78 AA 19 11 AB   40 A3 77 A5 E5 E0 7A 90  ...x....@.w...z.
#     0020: 5E F2 2B BD 76 D8 10 8E   AA BD 6A 7A 5F 20 58 76  ^.+.v.....jz_ Xv
#     0030: BC 3F 66 2D 3C AF 14 76   95 B6 87 0B B0 C7 E6 CD  .?f-<..v........
#     0040: 1E 50 3B 22 5C 89 05 B2   0B 3A 76 18 B9 B2 6A A2  .P;"\....:v...j.
#     0050: 0A F3 22 AA 93 D2 32 8D   F7 36 7B 7D 4E 22 20 12  .."...2..6..N" .
#     0060: 49 92 DF B3 7E BC 85 EE   52 A4 03 C2 2B F8 19 F5  I.......R...+...
#     0070: 94 2F 73 65 7C 43 17 85   49 61 DE 13 16 17 BD 7E  ./se.C..Ia......
#     0080: C9 18 F6 7F CA D3 81 6F   3C 63 07 21 2E 2A F2 83  .......o<c.!.*..
#     0090: 63 E6 4E EA 78 3A FB 76   F4 2B F7 E2 33 DA A7 01  c.N.x:.v.+..3...
#     00A0: C7 38 B5 CF 3E 31 40 1F   B2 AC F9 C9 C0 36 26 34  .8..>1@......6&4
#     00B0: D5 A7 64 A3 30 F9 0E F5   5D 6C 81 B5 C5 86 50 4D  ..d.0...]l....PM
#     00C0: 2B C8 C5 E0 F0 E9 04 04   AC CA B7 79 11 40 F2 85  +..........y.@..
#     00D0: D6 0A A8 CC F3 B0 89 AF   86 A4 0C 3E 6A 96 EB 92  ...........>j...
#     00E0: 10 5F 38 C3 73 A0 66 48   4E D2 4C 32 9C 8F E8 70  ._8.s.fHN.L2...p
#     00F0: CC A9 E6 BA 47 BC 3D 02   34 7B 62 DF 07 6C 29 B0  ....G.=.4.b..l).
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.509 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 70 9E 04 02 95 89 DD 4A   1A 68 8E C3 62 69 33 C5  p......J.h..bi3.
#     0010: 9A A3 EC 13 9B 8A 44 3C   CD 4A 96 E9 11 73 38 B2  ......D<.J...s8.
#     0020: 66 8A 64 6B 7C 9A B0 AB   BA 9B D2 D1 6E 17 C7 02  f.dk........n...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.510 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:33.576 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CF F6 45 0A EF 72 FD 84 EC 61 1B 88 40 ED 2B 0F 5D BA 76 59 E7 83 B8 C7 6F DF 70 45 B7 5F 94 30",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 08:32:34.087 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 08:32:34.087 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-19 08:32:46.779; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:47.116 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D7 0B 6B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:07.000 UTC",
#       "not  after"         : "2024-01-17 08:32:07.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EC 79 B9 3F D3 81 5F EC   97 C3 64 67 3D 23 1F 55  .y.?.._...dg=#.U
#           0010: F6 8D 00 99                                        ....
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 F7 25 9A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 08:32:05.000 UTC",
#       "not  after"         : "2024-01-17 08:32:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D9 D1 90 C9 FD A2 CB C2   FC E1 FC 4F 0E 95 D7 A4  ...........O....
#           0010: 87 22 12 8F                                        ."..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 08:32:47.131 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:47.554 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.554 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:47.556 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 08:32:47.556 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.560 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.572 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.573 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.573 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 08:32:47.575 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "13 D1 28 09 5E 2F 6C 99 89 A3 87 B6 ED 47 4A 09 A2 EF E5 AE EB 59 51 8B 9A 8B 54 C7 E1 07 F4 BD",
#     "session id"          : "56 63 C4 02 ED 02 14 FC 15 B7 1D 09 E2 6A 2B E1 F4 16 16 17 82 26 04 8C 6A 8A 37 B6 79 19 AA 4E",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 4E B8 C2 D3 77 30 85 AA   DC 6B 8E FE 06 D7 76 C8  N...w0...k....v.
#               0010: A9 59 3D E3 96 72 FB C5   E2 B3 A3 10 C3 42 42 78  .Y=..r.......BBx
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.594 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "CE 53 60 B2 F9 D8 2B 76 12 3C B1 F6 F3 EE B0 BE 27 5E B4 EB 7B 99 53 6F DB 68 63 C3 A4 97 22 58",
#     "session id"          : "56 63 C4 02 ED 02 14 FC 15 B7 1D 09 E2 6A 2B E1 F4 16 16 17 82 26 04 8C 6A 8A 37 B6 79 19 AA 4E",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 0F 72 2E CB 48 14 68 3E   96 1E 2A FD 15 57 34 5E  .r..H.h>..*..W4^
#             0010: 7E 56 E3 2E 78 63 CC A9   B2 5A 5D 42 D0 98 9D 01  .V..xc...Z]B....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.595 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.595 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.595 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.596 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.598 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.599 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.609 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.610 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.612 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 08:32:47.616 UTC|

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14579ms
ok 78 stop command for single port in 18703ms
not ok 79 status detects locally running solr in 1570ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 8170ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1553ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2603ms
ok 83 copying files around in 7163ms
ok 84 upconfig in 2934ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1250ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1254ms
not ok 87 Cleanup in 2579ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 59s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/5ak4q6jaqh5xg

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8218 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8218/

1 tests failed.
FAILED:  org.apache.solr.search.TestCoordinatorRole.testNRTRestart

Error Message:
java.lang.AssertionError: initial error time threshold exceeded

Stack Trace:
java.lang.AssertionError: initial error time threshold exceeded
	at __randomizedtesting.SeedInfo.seed([6AA5A351E4D32BB0:9A31139A46CEF966]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.search.TestCoordinatorRole.getHostCoreName(TestCoordinatorRole.java:481)
	at org.apache.solr.search.TestCoordinatorRole.testNRTRestart(TestCoordinatorRole.java:406)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 10287 lines...]
# ERROR: Error from server at http://localhost:41079/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16436ms
ok 60 Check help command in 4423ms
ok 61 basic post with a type specified in 5952ms
ok 62 basic post WITHOUT a type specified in 11784ms
ok 63 crawling a directory in 4532ms
ok 64 crawling a web site in 4600ms
ok 65 commit and optimize and delete in 4002ms
ok 66 args mode in 6616ms
ok 67 stdin mode in 3421ms
ok 68 post solr log into solr via script in 10605ms
ok 69 post solr log into solr via cli in 7261ms
ok 70 allowPaths - backup in 17065ms
ok 71 start solr with ssl in 18728ms
not ok 72 use different hostname when not checking peer-name in 20578ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 41079 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41079 (pid=3671573). Happy searching!
#
#     INFO  - 2023-10-19 04:47:08.112; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 04:47:08.117; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 04:47:08.598; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@757d6814(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 04:47:08.701; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-19 04:47:08.701; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5241cf67[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-19 04:47:18.431; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-19 04:47:18.436; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-19 04:47:18.813; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:41079/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-19 04:47:20.244; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 04:47:20.249; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41079/solr] to [https://127.0.0.1:41079].
# WARN  - 2023-10-19 04:47:21.067; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-19 04:47:21.108; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17187ms
ok 74 start solr with client truststore and security manager in 19201ms
not ok 75 start solr with mTLS needed in 53337ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-w2FZdM/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41079 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41079 (pid=3674244). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41080 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41080 (pid=3674350). Happy searching!
#
#     INFO  - 2023-10-19 04:48:23.456; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 04:48:23.464; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 04:48:24.421; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 04:48:24.429; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 04:48:24.431; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@716a7124(ca,h=[localhost],a=[],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:24.550 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D5 6E EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:10.000 UTC",
#     "not  after"         : "2024-01-17 04:48:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F DE 7C EE 05 DF 64 80   0F 96 73 D8 2A B1 80 79  ......d...s.*..y
#         0010: CC A1 2F 2C                                        ../,
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:24.554 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 8D 67 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:00.000 UTC",
#     "not  after"         : "2024-01-17 04:48:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:24.775 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:48:24.964 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:48:24.964 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:48:24.964 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-19 04:48:24.965 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:25.053 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.053 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:25.055 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:25.055 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.059 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.071 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.071 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.071 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:25.073 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "93 EC 09 84 8E EC 5A 0B 54 50 66 01 5A 21 51 5A 22 A4 5F 96 BE BD A6 73 14 49 57 64 F9 4E CF 19",
#   "session id"          : "21 34 F0 98 EB 08 E1 79 B6 5F BE EA AE 21 98 F9 39 9F 2C 6E 8B D6 EC E0 90 69 DD 52 87 6F 3B D9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6E BA 83 AA 79 8B 6D 83   32 42 8D C9 50 8C 1E C8  n...y.m.2B..P...
#             0010: 5E D3 3E B1 2F D6 8A 08   B1 76 4A 9A C2 58 A3 4B  ^.>./....vJ..X.K
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.286 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B4 CF C0 5A 21 C1 1D 34 05 FA E3 AC 94 64 C2 1D E2 24 00 BD BA 1C C0 57 81 A8 8D 18 9D 5B AE 93",
#   "session id"          : "21 34 F0 98 EB 08 E1 79 B6 5F BE EA AE 21 98 F9 39 9F 2C 6E 8B D6 EC E0 90 69 DD 52 87 6F 3B D9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: D3 AC 27 F5 A4 36 4B 6A   74 42 FB 7A 2A 5D 6A 99  ..'..6KjtB.z*]j.
#           0010: 2A 30 41 44 E2 09 09 67   A0 6A CE 0C 36 D4 E6 0A  *0AD...g.j..6...
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.286 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.287 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.288 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.288 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.289 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.289 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.289 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.294 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.294 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.295 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.301 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.301 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.302 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.303 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.304 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.304 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.327 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.331 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.335 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.340 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.341 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.346 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.347 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.349 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.349 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.350 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.353 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.354 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.355 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.355 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.452 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 4B C2 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:05.000 UTC",
#       "not  after"         : "2024-01-17 04:48:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 EF CA 7E BE FB 6D EE   FA 14 1D 4F F1 0C CD FD  ......m....O....
#           0010: D5 CA 43 AB                                        ..C.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.452 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.545 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.549 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 33 8C 9B 33 70 8F 9A 31   0E C1 2C A1 66 33 3C 4D  3..3p..1..,.f3<M
#     0010: EA AF 75 63 A2 7A 81 20   69 67 21 A1 19 12 FE 59  ..uc.z. ig!....Y
#     0020: 9A 08 E0 4E 79 16 0B 42   48 E4 95 69 74 2C A2 AB  ...Ny..BH..it,..
#     0030: F0 7C 79 73 6E A2 36 E8   C5 37 25 B1 1C 9B BC EC  ..ysn.6..7%.....
#     0040: D5 D5 3A 31 58 71 24 CA   BA ED 13 A2 92 FA 07 12  ..:1Xq$.........
#     0050: 92 96 81 3A 1F 8F 9E AD   63 88 F3 D0 04 02 3E A8  ...:....c.....>.
#     0060: D2 B7 C7 A8 DB 85 7A 40   89 CD 36 56 8F E9 91 FD  ......z@..6V....
#     0070: 6B 7C 55 C8 C0 90 27 CC   F0 B0 9E DD 99 32 1F 28  k.U...'......2.(
#     0080: DE 3A 46 74 62 2A 0B FF   E8 D6 B4 C3 56 C1 69 3E  .:Ftb*......V.i>
#     0090: 78 F0 E2 FC 00 DC 04 71   B4 3C AE F9 59 56 A3 96  x......q.<..YV..
#     00A0: 1F 31 15 5C 87 61 AB 9B   CB 82 50 C6 CB A8 5E 20  .1.\.a....P...^
#     00B0: D9 7A 7E 2C 3E 18 27 11   ED B7 8B 69 85 2C E0 91  .z.,>.'....i.,..
#     00C0: 4E 44 6F E3 4C 42 98 AF   B5 3C 42 24 15 1D 76 B7  NDo.LB...<B$..v.
#     00D0: E2 71 4D AC 10 86 9F A3   CC 14 2A A1 82 53 E6 12  .qM.......*..S..
#     00E0: D8 89 36 D1 15 1E 8F A2   D5 4C BF AB D9 C7 44 0B  ..6......L....D.
#     00F0: C7 35 20 4B F0 2E 3E CB   C4 3E C9 9D 43 A6 A1 2A  .5 K..>..>..C..*
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.551 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 15 09 17 1B 48 1D DA D9   E1 7F 48 48 48 0F 93 71  ....H.....HHH..q
#     0010: 1A 93 84 E4 05 28 22 45   F0 30 32 E0 B9 67 B1 A4  .....("E.02..g..
#     0020: C0 2A 0B 59 E5 25 B6 6B   66 97 73 DA EB 64 24 CF  .*.Y.%.kf.s..d$.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.552 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:25.553 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.553 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:25.553 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.553 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:25.554 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:25.554 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.554 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.555 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D5 6E EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:10.000 UTC",
#       "not  after"         : "2024-01-17 04:48:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F DE 7C EE 05 DF 64 80   0F 96 73 D8 2A B1 80 79  ......d...s.*..y
#           0010: CC A1 2F 2C                                        ../,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 E7 0F 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:02.000 UTC",
#       "not  after"         : "2024-01-17 04:48:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#           0010: DF AB 5C 22                                        ..\"
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.588 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 36 6D 19 C7 8D BD E1 ED   9D 33 36 07 72 30 71 00  6m.......36.r0q.
#     0010: 41 E0 D8 B6 7C 44 D2 D1   31 F6 18 94 C2 B8 32 BF  A....D..1.....2.
#     0020: B1 E2 D7 33 EE F6 C6 98   5C B7 8C 75 88 05 5D EC  ...3....\..u..].
#     0030: 26 36 23 B7 3F EB BC B2   55 AE BA A3 22 4F 1E F8  &6#.?...U..."O..
#     0040: 45 C1 FD 83 AE CD A9 12   4A B3 58 7C 8A E2 A4 4D  E.......J.X....M
#     0050: 70 E6 E4 C3 1A 8F 9A 58   01 3C 97 7B 13 32 31 B2  p......X.<...21.
#     0060: 4F E5 D0 A4 94 1D 20 DA   83 CD 31 23 2E 1A 8E B7  O..... ...1#....
#     0070: CE DB F7 A9 0F 0F C3 30   86 62 E9 B8 9B F9 AA 1F  .......0.b......
#     0080: 34 EA 35 47 07 DB 96 99   D9 BC 3E 06 B9 82 FD C5  4.5G......>.....
#     0090: 61 D5 B8 27 A3 76 7D 7F   C6 86 13 C4 A1 A8 93 73  a..'.v.........s
#     00A0: 93 ED 82 A5 B0 92 B5 91   B3 73 81 F6 3F 8D CE 34  .........s..?..4
#     00B0: 72 B9 28 52 17 75 14 65   95 35 5B 8A B6 A3 37 CC  r.(R.u.e.5[...7.
#     00C0: D6 0E C4 84 B7 9F 01 2A   75 C3 60 6C 52 B9 30 A6  .......*u.`lR.0.
#     00D0: 6E 0A 9B 56 6B D7 CA C0   30 A2 EF 7E 33 23 48 58  n..Vk...0...3#HX
#     00E0: A7 6A 60 8E 68 F2 03 B0   79 9F 1D 2C A4 0D CF 4D  .j`.h...y..,...M
#     00F0: F9 9F 3B 1B B9 A0 1F 1F   65 EC 03 DA 47 5F 95 43  ..;.....e...G_.C
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.590 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4A 78 66 7C D6 55 C4 7C   88 1F 7F 1B 83 C5 85 EC  Jxf..U..........
#     0010: D0 36 D6 26 5B C7 7B A3   D3 A3 84 93 2B 0A F5 52  .6.&[.......+..R
#     0020: 09 43 D4 EC 2F 3B 97 EF   8D A2 26 81 B0 D0 20 F7  .C../;....&... .
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.594 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:25.670 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "19 AB 6B 67 EA 8F 23 56 A7 47 B0 00 97 0D 20 A9 2A BC 27 D4 D4 A5 72 B8 E9 82 57 7A 01 C7 A9 53",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 04:48:26.483 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 04:48:26.485 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-19 04:48:28.546; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-19 04:48:28.551; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-19 04:48:28.946; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 04:48:28.949; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-19 04:48:28.949; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(ca,h=[localhost],a=[],w=[]) for Client@77192705[provider=null,keyStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-w2FZdM/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:28.985 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7B D5 6E EE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:10.000 UTC",
#     "not  after"         : "2024-01-17 04:48:10.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 8F DE 7C EE 05 DF 64 80   0F 96 73 D8 2A B1 80 79  ......d...s.*..y
#         0010: CC A1 2F 2C                                        ../,
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:28.989 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7F 8D 67 11",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:00.000 UTC",
#     "not  after"         : "2024-01-17 04:48:00.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:29.001 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:29.173 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.173 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:29.175 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:29.175 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.180 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.191 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.192 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.192 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:29.194 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F6 3E 05 FD F8 9C B3 AD 14 A1 DB 82 75 8D 29 9F 59 56 FC 67 02 55 F8 EE C8 38 B9 62 B3 7B CF F6",
#   "session id"          : "1C 36 D0 F6 EE AA 1D 6E 00 71 B1 93 B4 54 02 01 39 18 49 13 17 BC 5C FC 2F BE F8 16 13 D1 48 5A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: C3 5F C2 D4 42 33 07 C7   2A CF D6 23 D6 13 DF F7  ._..B3..*..#....
#             0010: BA 28 36 F0 3B B0 EB E2   27 9F 3E 1A 31 3A B8 19  .(6.;...'.>.1:..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.321 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "34 1D AC ED 47 A5 E2 97 00 BD 97 D7 FC CC C1 DF B1 6A 2B E4 1D 81 12 9B 8C 1C 9B 5A 3E 5D F9 8A",
#   "session id"          : "1C 36 D0 F6 EE AA 1D 6E 00 71 B1 93 B4 54 02 01 39 18 49 13 17 BC 5C FC 2F BE F8 16 13 D1 48 5A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F4 C1 60 2E 99 12 6B F7   34 B5 14 BA 17 2D 4C B9  ..`...k.4....-L.
#           0010: 19 6E 60 4F A4 9B 77 91   8E CD 0C 87 93 19 25 40  .n`O..w.......%@
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.322 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.322 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.325 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.326 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.328 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.329 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.329 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.331 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.343 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.345 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.346 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.366 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.367 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.367 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.367 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.368 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.368 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.369 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.369 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.370 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.370 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.370 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.373 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "73 4B C2 C4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:05.000 UTC",
#       "not  after"         : "2024-01-17 04:48:05.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F4 EF CA 7E BE FB 6D EE   FA 14 1D 4F F1 0C CD FD  ......m....O....
#           0010: D5 CA 43 AB                                        ..C.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.373 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.621 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "22 E7 0F 1D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-19 04:48:02.000 UTC",
#     "not  after"         : "2024-01-17 04:48:02.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#         0010: DF AB 5C 22                                        ..\"
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#         0010: DE 49 46 37                                        .IF7
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.624 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 55 3D 54 C7 E8 41 7B EE   CF CE 97 E1 4A 5F DF 5B  U=T..A......J_.[
#     0010: 7B FA F9 2F 94 C2 95 F9   92 60 63 91 7A 27 90 EC  .../.....`c.z'..
#     0020: 95 FA DB B0 D3 EE C6 5E   35 C5 F3 F4 05 86 A7 0B  .......^5.......
#     0030: E3 15 A2 3D 90 ED F6 8F   9F 3F BF 61 C6 61 30 17  ...=.....?.a.a0.
#     0040: F0 EC 69 FE 41 BF 9D DA   A0 23 9F F9 78 B2 9E DA  ..i.A....#..x...
#     0050: 8C 00 A6 0B C4 C4 10 8E   32 98 33 AE FF 33 53 4F  ........2.3..3SO
#     0060: 72 73 43 E6 27 68 FE 9D   84 41 9C D3 2D 28 D1 7C  rsC.'h...A..-(..
#     0070: 3A B4 E0 BA 87 43 E7 5D   0F BA 4B 79 1F E8 F9 A1  :....C.]..Ky....
#     0080: 9F 51 29 34 0C 88 FA 4C   17 94 6F 7E 32 18 CC 07  .Q)4...L..o.2...
#     0090: DA 6B 72 EC 80 29 41 16   64 AF 1F 26 04 F0 53 14  .kr..)A.d..&..S.
#     00A0: 38 9D 95 DB 08 76 B0 21   86 4D CD C0 15 D4 BA D2  8....v.!.M......
#     00B0: EC BE C6 84 B1 EB 11 E0   43 F9 F2 80 12 FF B1 57  ........C......W
#     00C0: 4E 73 97 97 1F AD 93 3C   04 0B 55 94 5E CD 34 ED  Ns.....<..U.^.4.
#     00D0: 97 AB 12 31 B7 38 6F 95   DB 94 5A 02 DC B6 30 E8  ...1.8o...Z...0.
#     00E0: 84 08 CC 04 19 6C 98 79   E1 A4 B9 F9 9C 91 D0 07  .....l.y........
#     00F0: 95 98 9F A9 EC 71 19 E2   65 06 86 71 FE 23 D2 D9  .....q..e..q.#..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.626 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3E F1 98 94 E1 60 07 92   4E A7 A0 54 D4 B2 C4 A4  >....`..N..T....
#     0010: 32 2B 7A D8 27 FB 2B 2C   35 C9 48 EA FF D4 98 F7  2+z.'.+,5.H.....
#     0020: B5 45 7D E2 1A 07 02 F9   A8 93 F5 80 FD E5 B3 53  .E.............S
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.627 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:29.628 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.628 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:29.628 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.628 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-19 04:48:29.628 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-19 04:48:29.629 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.629 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.631 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7B D5 6E EE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:10.000 UTC",
#       "not  after"         : "2024-01-17 04:48:10.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 8F DE 7C EE 05 DF 64 80   0F 96 73 D8 2A B1 80 79  ......d...s.*..y
#           0010: CC A1 2F 2C                                        ../,
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 E7 0F 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:02.000 UTC",
#       "not  after"         : "2024-01-17 04:48:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#           0010: DF AB 5C 22                                        ..\"
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.653 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3F BF C2 43 E6 D4 69 3D   DA 5F BD F7 28 33 9B F1  ?..C..i=._..(3..
#     0010: 5B E7 81 13 0D F6 56 58   5A A2 9B 6F C0 0B 22 7F  [.....VXZ..o..".
#     0020: 3B 88 22 99 EF 2E 1C 6A   76 E5 A5 49 57 54 74 32  ;."....jv..IWTt2
#     0030: 39 C1 C2 3E 3C 16 0C CE   A3 22 49 A0 3F B8 84 DA  9..><...."I.?...
#     0040: 19 AE 29 A1 54 47 0B 30   29 05 F1 76 7C F6 9B FE  ..).TG.0)..v....
#     0050: A5 8D FB 09 5B BA 53 EA   CC E4 DB 96 F6 65 47 03  ....[.S......eG.
#     0060: 99 04 96 AE 09 C1 7E 99   3F B0 4E 97 6D 73 7E 9C  ........?.N.ms..
#     0070: F7 2E CA 5B A7 76 62 BF   A4 88 11 F4 D8 0B 87 1E  ...[.vb.........
#     0080: BB 9E 09 A4 D4 00 97 0D   A0 63 FA 31 A5 B0 08 7B  .........c.1....
#     0090: 20 4A 5F FD 65 7E E9 8A   DF 35 B3 5F 5F B1 30 95   J_.e....5.__.0.
#     00A0: 65 DF F3 13 F5 68 23 A5   C5 91 18 B3 1E F1 2B 8E  e....h#.......+.
#     00B0: DC 4F 97 EB 92 1C F9 D7   A5 41 70 27 5B 6A 44 33  .O.......Ap'[jD3
#     00C0: 3A 69 0C 49 C7 12 06 74   67 6A 93 1B 5B BC 7F 09  :i.I...tgj..[...
#     00D0: 34 01 C4 AB 8C 25 89 07   FE E2 26 20 DA 86 F9 9E  4....%....& ....
#     00E0: D0 18 98 7A 0A 6F 64 58   5B 92 A5 79 CD 28 67 5B  ...z.odX[..y.(g[
#     00F0: 1E B6 0F E8 84 D8 19 2F   B8 51 B3 50 69 37 88 B7  ......./.Q.Pi7..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.654 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: FF 00 22 A3 4F 26 F4 66   BC C2 00 51 8D 74 71 04  ..".O&.f...Q.tq.
#     0010: 45 22 2B 56 73 E8 02 43   6E 2E D3 9C 95 CA E3 11  E"+Vs..Cn.......
#     0020: 06 4F ED 94 98 0F 66 1E   C9 B9 55 5B 26 A3 B8 25  .O....f...U[&..%
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.654 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:29.704 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C9 1A A0 21 29 38 34 F1 F5 70 4D 8F F5 99 FF A4 D9 16 8D 80 08 A4 B7 12 82 C8 F0 18 96 49 DE D8",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-19 04:48:29.972 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-19 04:48:29.974 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-19 04:48:42.004; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:42.409 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7F 8D 67 11",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:00.000 UTC",
#       "not  after"         : "2024-01-17 04:48:00.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#           0010: DF AB 5C 22                                        ..\"
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "22 E7 0F 1D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-19 04:48:02.000 UTC",
#       "not  after"         : "2024-01-17 04:48:02.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 79 C8 FF 65 BC 74 43 B4   38 86 24 86 47 95 98 DB  y..e.tC.8.$.G...
#           0010: DF AB 5C 22                                        ..\"
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: BC 56 DC 75 9A 8B 16 09   E8 6A 44 57 3B EC 84 E2  .V.u.....jDW;...
#           0010: DE 49 46 37                                        .IF7
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-19 04:48:42.422 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:42.585 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.585 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:42.587 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-19 04:48:42.587 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.591 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.602 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.602 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.602 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-19 04:48:42.605 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "EB 38 AD CC ED 4E B5 39 F0 B1 72 B8 C1 33 9D 76 C5 16 E1 45 25 32 55 7F 9A 2C E0 24 55 1D 06 08",
#     "session id"          : "03 66 04 0D B8 CA 93 80 EE B4 64 21 F6 F8 5B E4 6E 65 74 42 4C 11 8A 80 B0 FA 0C B5 4B CA 43 04",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: BE 51 16 48 FB 25 05 03   03 6D C9 7A 35 AC CC E5  .Q.H.%...m.z5...
#               0010: B3 F7 76 0D 10 1F 02 EC   90 CB DF 17 F5 2C 6E 72  ..v..........,nr
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-19 04:48:42.620 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "F4 35 0C F7 BB 47 1B BF 6B 4A 70 92 0E 61 CF 85 1F CF 15 9F 91 F0 AD EA EE 68 E0 C0 1C F4 0C 4F",
#     "session id"          : "03 66 04 0D B8 CA 93 80 EE B4 64 21 F6 F8 5B E4 6E 65 74 42 4C 11 8A 80 B0 FA 0C B5 4B CA 43 04",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#      

[...truncated too long message...]

llInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14798ms
ok 78 stop command for single port in 17974ms
not ok 79 status detects locally running solr in 1538ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7615ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1535ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2978ms
ok 83 copying files around in 6809ms
ok 84 upconfig in 2651ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1243ms
not ok 87 Cleanup in 2527ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.search.TestCoordinatorRole.testNRTRestart (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestCoordinatorRole.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestCoordinatorRole.testNRTRestart" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=6AA5A351E4D32BB0 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 6m 23s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/hvluol7ftncsw

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8217 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8217/

All tests passed

Build Log:
[...truncated 1434 lines...]
BUILD FAILED in 1h 3m 24s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/xdg5czc56hjs4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8216 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8216/

All tests passed

Build Log:
[...truncated 1262 lines...]
# ERROR: Error from server at http://localhost:41773/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16540ms
ok 60 Check help command in 4354ms
ok 61 basic post with a type specified in 5878ms
ok 62 basic post WITHOUT a type specified in 11646ms
ok 63 crawling a directory in 4730ms
ok 64 crawling a web site in 5121ms
ok 65 commit and optimize and delete in 3992ms
ok 66 args mode in 6617ms
ok 67 stdin mode in 3372ms
ok 68 post solr log into solr via script in 12458ms
ok 69 post solr log into solr via cli in 9708ms
ok 70 allowPaths - backup in 19501ms
ok 71 start solr with ssl in 23594ms
not ok 72 use different hostname when not checking peer-name in 23814ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 41773 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41773 (pid=3157641). Happy searching!
#
#     INFO  - 2023-10-18 22:52:42.197; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 22:52:42.203; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 22:52:42.654; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 22:52:42.718; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 22:52:42.718; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-18 22:52:54.641; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 22:52:54.646; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-18 22:52:54.989; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:41773/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-18 22:52:56.383; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 22:52:56.387; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41773/solr] to [https://127.0.0.1:41773].
# WARN  - 2023-10-18 22:52:57.193; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 22:52:57.240; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17071ms
ok 74 start solr with client truststore and security manager in 19250ms
not ok 75 start solr with mTLS needed in 53069ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-kFB0IL/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41773 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41773 (pid=3160814). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41774 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41774 (pid=3160922). Happy searching!
#
#     INFO  - 2023-10-18 22:53:59.537; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 22:53:59.551; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 22:54:00.265; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 22:54:00.267; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 22:54:00.268; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:00.305 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 24 41 AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:45.000 UTC",
#     "not  after"         : "2024-01-16 22:53:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 2E 4F 5F 6D D9 0B 96   50 4C 85 49 DC 74 63 42  ..O_m...PL.I.tcB
#         0010: 85 F4 75 AD                                        ..u.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:00.310 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 DC 6A FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:36.000 UTC",
#     "not  after"         : "2024-01-16 22:53:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:00.324 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:00.713 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.714 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:00.720 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:00.721 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.734 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.767 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.767 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.768 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:00.770 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "39 99 74 42 AC 89 B8 D9 D2 72 79 7A 3D 7D EE BC 77 87 D4 29 6B 1B 21 C0 22 B2 1F B7 A1 4D 4C 06",
#   "session id"          : "85 48 FC EC A2 D9 BA 17 84 C6 E6 F1 D0 16 44 5B CD 2A EF F7 C3 02 30 A5 A7 89 80 5C 03 EC 5B 91",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: EC F7 34 EB EB 00 69 2A   1E E1 F6 97 9B 82 56 5A  ..4...i*......VZ
#             0010: 22 98 B2 90 DC DE D5 59   B2 27 FE 5F C6 A8 9B 7E  "......Y.'._....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.215 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8D 04 9D 12 22 4A D2 7E 6D 20 A8 3C 15 E5 FF FC 3F 9A AE 56 EB 7E 41 BC 1E 22 C4 D8 D7 A1 FB 0D",
#   "session id"          : "85 48 FC EC A2 D9 BA 17 84 C6 E6 F1 D0 16 44 5B CD 2A EF F7 C3 02 30 A5 A7 89 80 5C 03 EC 5B 91",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: CE AC 03 6E AC FF D9 06   AC 04 CA F4 71 6C 04 08  ...n........ql..
#           0010: 60 E3 18 8B EC 28 91 2A   1E 48 AD 0B 83 56 7C 30  `....(.*.H...V.0
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.234 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.234 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:01.236 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:01.236 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:01.237 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:01.237 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.242 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.259 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.259 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.259 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.259 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.259 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.260 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.261 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.300 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.310 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.318 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.325 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.326 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.327 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.330 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.331 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.331 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.331 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.332 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.335 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.335 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.344 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 D1 4F CA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:41.000 UTC",
#       "not  after"         : "2024-01-16 22:53:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 68 75 F2 9D 33 20 90   FF D0 94 18 6A B3 D2 92  .hu..3 .....j...
#           0010: 43 55 B1 A8                                        CU..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.344 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.447 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.456 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 77 74 BE 78 19 0E 14 49   FB 05 69 1B D7 32 24 CB  wt.x...I..i..2$.
#     0010: 2A 8B 45 23 05 D4 4A D0   0E 1E C9 48 5F 73 82 B6  *.E#..J....H_s..
#     0020: 3E 8C 95 48 82 49 49 BA   3A 3F BE F1 D2 7C 5F 8E  >..H.II.:?...._.
#     0030: 9A A8 74 C1 2C 7D BD 8D   24 9D C5 5E 6D 12 EA FF  ..t.,...$..^m...
#     0040: 8B F7 FE 9F 20 6E D2 04   7F 0E 1B 3B E5 83 50 19  .... n.....;..P.
#     0050: 29 C3 52 34 47 D9 ED B6   55 2D D6 9D D0 A0 6F EA  ).R4G...U-....o.
#     0060: 15 04 10 62 6A A2 4A AE   1F 5C 24 DE 71 CA E4 66  ...bj.J..\$.q..f
#     0070: CC 0B 8E DC 9B B1 1F 5B   4F F0 7F F7 F5 00 8B 97  .......[O.......
#     0080: 74 79 52 DD 0B B8 77 50   F1 F1 B1 BE 1E 30 1B 97  tyR...wP.....0..
#     0090: 69 9F 68 F7 AA 81 6C 37   6E 74 3F 4B 7E 2D 11 AC  i.h...l7nt?K.-..
#     00A0: 42 2C 5F D5 08 C1 46 7B   6E 94 E2 69 97 B4 7D 0A  B,_...F.n..i....
#     00B0: BA 06 AA 4A FB 9B A9 9D   60 3F E6 13 98 D2 22 BE  ...J....`?....".
#     00C0: 72 F5 FA DF B1 CF 08 19   97 B7 D3 12 66 C1 26 A4  r...........f.&.
#     00D0: E3 CF A4 D2 BE 1E F8 84   A7 42 C0 B8 01 DC 95 FE  .........B......
#     00E0: F8 24 39 16 6D EA 6B 04   8B A6 3B A3 B8 80 57 45  .$9.m.k...;...WE
#     00F0: F0 1E 38 66 80 6E 56 D2   6F 60 7E 67 A4 79 50 7E  ..8f.nV.o`.g.yP.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.462 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 98 2F 1D 06 53 49 00 62   E3 06 52 FA 5A 3C AC 8B  ./..SI.b..R.Z<..
#     0010: CF 3A 95 77 40 0C 15 2F   BA 40 D7 7E 2D 0B 28 0B  .:.w@../.@..-.(.
#     0020: D7 EB D3 8B D6 78 B8 F7   F1 1D 67 91 39 02 A8 75  .....x....g.9..u
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.464 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:01.465 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.465 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:01.465 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.465 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:01.466 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:01.466 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.466 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.471 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 24 41 AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:45.000 UTC",
#       "not  after"         : "2024-01-16 22:53:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 2E 4F 5F 6D D9 0B 96   50 4C 85 49 DC 74 63 42  ..O_m...PL.I.tcB
#           0010: 85 F4 75 AD                                        ..u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C C9 E2 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:38.000 UTC",
#       "not  after"         : "2024-01-16 22:53:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#           0010: 86 C1 7F 77                                        ...w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.523 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 35 D6 B2 BE B8 8D 18 15   25 27 63 0A BD 2B C0 63  5.......%'c..+.c
#     0010: 0D 6A 9F 8D 0F D4 2B D1   78 E4 79 EA 99 3A DE E6  .j....+.x.y..:..
#     0020: C7 BB FA 84 06 7D 6B 8D   90 1F 23 CD FC D4 B4 91  ......k...#.....
#     0030: 71 78 49 D0 22 44 DB 82   6D 0F 26 56 64 68 74 5D  qxI."D..m.&Vdht]
#     0040: 6D 62 DE A7 18 21 FB F4   B1 58 E6 FF FB 32 B7 3A  mb...!...X...2.:
#     0050: 9D A9 E0 4E 17 BA FD FF   BE DB CA E7 FE 29 9B 0A  ...N.........)..
#     0060: 0C DD 24 11 D1 01 3C 73   54 50 BD E9 93 B4 11 A0  ..$...<sTP......
#     0070: 3B AE B4 31 8B 45 3B 1D   5D EE 9B 14 62 88 3A FB  ;..1.E;.]...b.:.
#     0080: 2B 4F 9B 40 CA EA 01 0D   10 8F B3 32 01 AA 5F 95  +O.@.......2.._.
#     0090: 58 F6 DF 63 DB F4 74 F7   93 47 B5 00 A7 0D 97 F8  X..c..t..G......
#     00A0: 2C EC 72 5D 8E 40 61 02   44 EC FF D7 88 FC F6 73  ,.r].@a.D......s
#     00B0: BE 74 FC F3 64 26 AE 43   5B 8D 36 B9 F5 49 85 30  .t..d&.C[.6..I.0
#     00C0: 30 E5 81 00 6E A1 D4 21   8A 92 BF ED 6D 13 13 67  0...n..!....m..g
#     00D0: 15 CE ED A2 E0 98 B6 95   CD 85 74 EF F4 09 B8 FF  ..........t.....
#     00E0: A6 D7 DC 4D 3F BB 98 D3   EA ED 85 71 1C CC FF 0E  ...M?......q....
#     00F0: 74 8D C0 4E 0E DF 13 38   F7 AD F1 AB 2E 09 04 C3  t..N...8........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.525 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 91 D7 68 55 5F 37 FA CD   FB 7A C2 ED 0F 5F B2 17  ..hU_7...z..._..
#     0010: 38 0E 98 6D 2A 04 A9 2B   83 0A 0C 64 B1 67 42 EB  8..m*..+...d.gB.
#     0020: B1 2C 4E 82 3E D2 A7 F4   8E 02 F0 8E 53 8F 16 0D  .,N.>.......S...
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.529 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:01.807 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "96 D3 AB 46 F8 43 C2 24 C7 30 97 4C B7 EE 11 E4 C7 A4 9A DA 7F CD 05 DE EF 26 98 C5 8F 04 D9 BC",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 22:54:02.467 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 22:54:02.468 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-18 22:54:02.482 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# INFO  - 2023-10-18 22:54:04.109; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 22:54:04.114; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 22:54:04.496; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 22:54:04.498; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 22:54:04.498; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-kFB0IL/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:04.535 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 24 41 AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:45.000 UTC",
#     "not  after"         : "2024-01-16 22:53:45.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 2E 4F 5F 6D D9 0B 96   50 4C 85 49 DC 74 63 42  ..O_m...PL.I.tcB
#         0010: 85 F4 75 AD                                        ..u.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:04.539 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "72 DC 6A FE",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:36.000 UTC",
#     "not  after"         : "2024-01-16 22:53:36.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:04.551 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:04.719 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.720 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:04.721 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:04.722 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.726 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.737 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.737 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.737 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:04.740 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "2C 58 96 D3 6F 6F 0B A2 D8 AD 82 C5 C7 4A 4A 68 EE DE 6D 79 79 C5 DB 74 D2 B8 95 A3 C3 00 0E 3A",
#   "session id"          : "5C 07 39 6D F3 4E 48 DD 59 47 54 A5 29 E2 C4 AF 01 CC FE 0D 12 F7 2C 46 A7 60 C7 1D 34 D7 0D 4F",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A2 86 07 C6 91 01 E1 FD   B0 63 AF E0 58 8F 6F 04  .........c..X.o.
#             0010: 56 D8 49 64 05 E9 08 EC   98 3A 06 03 54 8C 7E 23  V.Id.....:..T..#
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.843 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "78 6A F0 B3 0F D8 86 31 CB DC 52 6A BC B7 B1 4F 66 D4 DA 16 D9 55 A1 37 5B 12 15 F2 F3 AC A0 78",
#   "session id"          : "5C 07 39 6D F3 4E 48 DD 59 47 54 A5 29 E2 C4 AF 01 CC FE 0D 12 F7 2C 46 A7 60 C7 1D 34 D7 0D 4F",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 78 B4 6B D1 B5 E5 4C 76   D6 DB 36 E9 02 EE BB D4  x.k...Lv..6.....
#           0010: 05 63 5F 35 B3 E9 56 68   76 06 FD F4 40 54 EC 0B  .c_5..Vhv...@T..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.844 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.844 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.855 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.856 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.858 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.858 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.858 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.859 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.866 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.878 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.880 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.889 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.889 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.889 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.890 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.891 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.892 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.892 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.892 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.893 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.893 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.893 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.897 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "21 D1 4F CA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:41.000 UTC",
#       "not  after"         : "2024-01-16 22:53:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DE 68 75 F2 9D 33 20 90   FF D0 94 18 6A B3 D2 92  .hu..3 .....j...
#           0010: 43 55 B1 A8                                        CU..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.897 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.980 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C C9 E2 04",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 22:53:38.000 UTC",
#     "not  after"         : "2024-01-16 22:53:38.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#         0010: 86 C1 7F 77                                        ...w
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#         0010: 55 23 A3 0E                                        U#..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.982 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6D C1 BC 6B EA 80 30 C8   E5 D9 DA 8F 18 7D C0 1D  m..k..0.........
#     0010: 32 9F 13 40 EC A9 0D F6   06 3A 32 52 33 B5 D5 15  2..@.....:2R3...
#     0020: B9 4B C6 F9 DD A5 18 1B   39 B9 D1 FD DD 74 88 08  .K......9....t..
#     0030: 33 84 F1 5E 5B BA 0F 1B   DE 5F 98 E9 4E 0C 5C 06  3..^[...._..N.\.
#     0040: 2E 48 D2 2A D2 B7 1D F2   DA 7F D9 CE 02 1D BB 23  .H.*...........#
#     0050: 02 83 DE 9A 6C 3D E4 F2   81 7C B8 7E 41 CD C2 D9  ....l=......A...
#     0060: 60 6B 1D 01 67 92 64 A3   B6 F0 B8 CA 45 9B 46 16  `k..g.d.....E.F.
#     0070: 73 AD BF 14 EE 48 10 BF   BD EC EA 00 23 54 2B 81  s....H......#T+.
#     0080: 3F 12 CC 8E F1 2E 4F E9   77 88 07 14 74 47 01 0C  ?.....O.w...tG..
#     0090: DB B4 E4 67 7F B0 5E E4   01 C2 00 D0 34 00 B0 EB  ...g..^.....4...
#     00A0: 08 43 A3 CC B9 5B 28 07   53 D8 77 F7 A7 B3 21 FA  .C...[(.S.w...!.
#     00B0: 54 3E E3 82 1B 7B A8 CD   76 5B D6 9D 81 05 BA 79  T>......v[.....y
#     00C0: 72 B6 D2 15 9B 48 B7 FC   D9 A9 70 1B D9 97 68 76  r....H....p...hv
#     00D0: 4C 1B 14 C3 7C 87 2D D5   FD E5 ED 1B 3A 38 0E A3  L.....-.....:8..
#     00E0: DB B2 7B 33 A2 99 C9 DB   05 94 EE 0D DE 3E 7C 58  ...3.........>.X
#     00F0: 5D 76 6F 6E DD 94 0B E1   69 16 83 64 51 D0 4E 8B  ]von....i..dQ.N.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.984 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 03 92 F6 3F DB 97 63 D9   AB A7 9D D4 82 72 AF 50  ...?..c......r.P
#     0010: 7B 67 55 B3 9A 52 F2 7F   13 D1 80 16 6D 6F A2 26  .gU..R......mo.&
#     0020: AE 90 2D F1 A7 3B 40 C8   49 7C 7C C2 64 C1 60 6C  ..-..;@.I...d.`l
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.986 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:04.986 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.987 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:04.987 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.987 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 22:54:04.987 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:04.987 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.988 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:04.990 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 24 41 AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:45.000 UTC",
#       "not  after"         : "2024-01-16 22:53:45.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 2E 4F 5F 6D D9 0B 96   50 4C 85 49 DC 74 63 42  ..O_m...PL.I.tcB
#           0010: 85 F4 75 AD                                        ..u.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C C9 E2 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:38.000 UTC",
#       "not  after"         : "2024-01-16 22:53:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#           0010: 86 C1 7F 77                                        ...w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:05.014 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 01 50 DC E5 18 82 E7 4F   8B 5E 7E 11 CA 44 A7 23  .P.....O.^...D.#
#     0010: 07 89 C9 C4 7F 09 87 75   A5 24 DC 27 B4 7E 27 1C  .......u.$.'..'.
#     0020: 6B 28 EF 5C 6C 5B 47 73   DD C9 E3 4F E6 CF 87 38  k(.\l[Gs...O...8
#     0030: 7A 1A 8E 04 EC 85 0B 87   8F C7 CC C3 BA BD 0C D0  z...............
#     0040: 35 5E 1F E0 6B F9 25 7F   D4 F5 50 FA 64 10 06 46  5^..k.%...P.d..F
#     0050: 0F DF 38 CF 8B 05 B9 A1   72 45 5D BB 96 32 41 2E  ..8.....rE]..2A.
#     0060: 17 02 9C 24 17 99 DA 9D   33 B0 77 E9 7E 9E 50 FA  ...$....3.w...P.
#     0070: C0 AD C2 20 2D ED C6 F5   6B 84 DF 3E 9E 02 2A 12  ... -...k..>..*.
#     0080: 43 9C 94 04 C2 88 1B A2   E0 19 20 1D 28 FE FA 58  C......... .(..X
#     0090: 9A 56 B6 4A 0E E1 6A CB   B3 78 CD D8 AA 11 68 94  .V.J..j..x....h.
#     00A0: 01 BC 82 96 CD 5F C4 43   68 60 90 D2 32 28 90 71  ....._.Ch`..2(.q
#     00B0: F6 6E BD 6A 7F C0 EE A5   0C DE FF A2 42 EA CE E1  .n.j........B...
#     00C0: 38 F0 93 8C DD 17 8E 1E   C3 4F E1 5B D6 79 00 88  8........O.[.y..
#     00D0: 3D 31 8A EC EA 04 9B B4   CD C3 02 03 33 C1 61 4B  =1..........3.aK
#     00E0: C4 13 BC 5B B5 8F BA 03   F1 C6 00 00 DA F8 B8 E3  ...[............
#     00F0: 44 8E 6E A8 E5 BC BA AA   34 09 D1 0B 83 9F E1 36  D.n.....4......6
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:05.015 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 36 AF 66 DE D4 45 FC C7   47 C4 C1 F5 AF 05 15 67  6.f..E..G......g
#     0010: CF FF D7 EA 93 38 3F 05   0F FB A1 87 0F 1B C4 7B  .....8?.........
#     0020: 4E CD F4 4C 9C 9C 14 E4   33 F0 49 38 75 17 44 59  N..L....3.I8u.DY
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:05.016 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:05.107 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "CD 57 34 10 89 B0 8A 32 3D 18 A5 E1 2C 9D 9D BB 22 94 08 27 7E A5 10 75 B0 85 05 E9 B7 9D A4 8A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:05.136 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:05.136 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:05.136 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 22:54:05.136 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-18 22:54:05.429 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 22:54:05.430 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-18 22:54:19.241; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:19.597 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C C9 E2 04",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:38.000 UTC",
#       "not  after"         : "2024-01-16 22:53:38.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#           0010: 86 C1 7F 77                                        ...w
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 63 9E 0B AE B2 FD 2E 6A   98 7B 54 93 62 F1 95 A5  c......j..T.b...
#           0010: 55 23 A3 0E                                        U#..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "72 DC 6A FE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 22:53:36.000 UTC",
#       "not  after"         : "2024-01-16 22:53:36.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 D9 58 5E 2C 8D 81 8B   50 7A 31 C9 BD 01 4C F9  U.X^,...Pz1...L.
#           0010: 86 C1 7F 77                                        ...w
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 22:54:19.611 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:19.777 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.777 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:19.779 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 22:54:19.779 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.783 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.795 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.795 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.795 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 22:54:19.797 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "07 24 4C B9 BF D1 E5 F1 E3 77 39 45 AC 60 56 52 AF 40 DB 15 75 3A 79 04 F1 68 27 8A 70 6E 28 7A",
#     "session id"          : "C6 37 9F A6 DB F1 53 AD EB BB 6F B3 7F 33 B4 DF D4 CD 3B B2 06 33 6F 69 C1 14 E9 A7 FB 3B B5 C3",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 97 26 9C 62 AC 7B 36 A4   35 47 0C 37 CA 43 63 1C  .&.b..6.5G.7.Cc.
#               0010: 2A 63 0D A3 D5 25 FB FF   69 6E 02 86 CD 62 EA 32  *c...%..in...b.2
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.818 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "C9 2A BF AE 4D 4D 01 32 8B 1D 42 9A 86 6F 94 4E A4 D5 ED 74 49 C4 98 87 8D 4F 79 5A 8A 87 4C C7",
#     "session id"          : "C6 37 9F A6 DB F1 53 AD EB BB 6F B3 7F 33 B4 DF D4 CD 3B B2 06 33 6F 69 C1 14 E9 A7 FB 3B B5 C3",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 8E A9 FB 69 6F 6B 08 59   77 94 E5 9E 67 1E 20 AF  ...iok.Yw...g. .
#             0010: B8 A4 F9 AF 27 15 0D 20   2F 50 10 8A D9 76 DD 78  ....'.. /P...v.x
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.819 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.819 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.820 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.821 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.821 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.821 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.822 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.825 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.825 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.825 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.825 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.826 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.829 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:19.829 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 22:54:19.830 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.830 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.836 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.837 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.839 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 22:54:19.842 UTC|EncryptedExtensions.java:171|Consuming Encrypted

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14359ms
ok 78 stop command for single port in 17395ms
not ok 79 status detects locally running solr in 1528ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7505ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1569ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3033ms
ok 83 copying files around in 6638ms
ok 84 upconfig in 2633ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1235ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1254ms
not ok 87 Cleanup in 2503ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 53s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/liyzhznh33sau

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8215 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8215/

All tests passed

Build Log:
[...truncated 1430 lines...]
BUILD FAILED in 1h 2m 32s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/tzt5vy7hq6yw4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8214 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8214/

All tests passed

Build Log:
[...truncated 1262 lines...]
# ERROR: Error from server at http://localhost:40889/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16452ms
ok 60 Check help command in 5017ms
ok 61 basic post with a type specified in 5652ms
ok 62 basic post WITHOUT a type specified in 11781ms
ok 63 crawling a directory in 4489ms
ok 64 crawling a web site in 4785ms
ok 65 commit and optimize and delete in 3907ms
ok 66 args mode in 6615ms
ok 67 stdin mode in 3552ms
ok 68 post solr log into solr via script in 10075ms
ok 69 post solr log into solr via cli in 7216ms
ok 70 allowPaths - backup in 16750ms
ok 71 start solr with ssl in 19018ms
not ok 72 use different hostname when not checking peer-name in 20613ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 40889 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40889 (pid=2245093). Happy searching!
#
#     INFO  - 2023-10-18 15:48:58.500; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 15:48:58.509; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 15:48:58.938; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 15:48:59.042; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 15:48:59.042; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-18 15:49:08.934; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 15:49:08.938; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-18 15:49:09.314; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:40889/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-18 15:49:10.716; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 15:49:10.720; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:40889/solr] to [https://127.0.0.1:40889].
# WARN  - 2023-10-18 15:49:11.519; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 15:49:11.555; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16646ms
ok 74 start solr with client truststore and security manager in 19621ms
not ok 75 start solr with mTLS needed in 54319ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-ZY0ybN/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 40889 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 40889 (pid=2247824). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 40890 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]  
# Started Solr server on port 40890 (pid=2247934). Happy searching!
#
#     INFO  - 2023-10-18 15:50:12.924; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 15:50:12.942; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 15:50:13.895; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 15:50:13.898; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 15:50:13.898; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:13.966 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F F8 44 99",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:59.000 UTC",
#     "not  after"         : "2024-01-16 15:49:59.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 BF 26 F9 41 9C 70 60   DA 30 23 61 98 63 D3 26  ..&.A.p`.0#a.c.&
#         0010: 40 C0 AE 0B                                        @...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:13.971 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 19 6E 3A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:50.000 UTC",
#     "not  after"         : "2024-01-16 15:49:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:14.009 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:14.537 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.537 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:14.539 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:14.539 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.544 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.563 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.563 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.563 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:14.566 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "40 D1 3C 31 B5 8A 53 F3 B5 E9 C4 6C 23 BC D6 CE 26 BA 64 C6 5E 41 C9 71 16 DE 30 68 B5 61 03 A7",
#   "session id"          : "76 CF 8E 44 AF 31 60 5F 0C DB 92 2E 99 8E 11 7F 7A A9 62 A2 A4 D0 F8 56 BA AE 7B 3E F2 50 85 8C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 41 F1 C7 E6 67 AA FA E7   CC 3B 45 49 7B C1 A5 2D  A...g....;EI...-
#             0010: 92 DD E1 33 DD D9 39 B2   12 50 3E 99 4B 08 19 3D  ...3..9..P>.K..=
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.718 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "BA C8 E4 B3 DC 96 EF 3B F5 38 60 78 13 56 02 70 AA 2A 6F F9 EE F8 C6 E3 0C 58 3E B3 E7 1D 2F 51",
#   "session id"          : "76 CF 8E 44 AF 31 60 5F 0C DB 92 2E 99 8E 11 7F 7A A9 62 A2 A4 D0 F8 56 BA AE 7B 3E F2 50 85 8C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 71 76 EF DB 0E A0 03 5D   9E A1 03 D8 14 92 88 20  qv.....].......
#           0010: 19 A9 7F E7 98 7D 39 0F   91 B5 56 76 83 CC 2C 1F  ......9...Vv..,.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.719 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.720 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.721 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.722 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.726 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.726 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.726 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.726 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.726 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.732 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.737 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.738 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.738 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.738 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.739 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.739 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.739 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:14.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:14.740 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.740 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.791 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.792 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.793 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.800 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.801 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.801 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.809 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.809 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.810 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:14.810 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:14.810 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.811 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.811 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.812 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.812 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.813 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.813 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:14.813 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.816 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 12 B2 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:55.000 UTC",
#       "not  after"         : "2024-01-16 15:49:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 9A E6 D1 7F D5 F2 99   B7 9C A8 4A 54 B6 52 03  ...........JT.R.
#           0010: AD 94 E5 14                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.816 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.995 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:14.998 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 38 C6 60 A2 79 0E 8A E4   BE 64 B0 D3 85 FA EA 4E  8.`.y....d.....N
#     0010: A0 4C 7F 6A 87 3F CE E0   37 E4 D0 3D 97 42 64 6D  .L.j.?..7..=.Bdm
#     0020: B3 65 A7 41 5A 22 8F 2D   57 40 56 C2 D2 AF 32 CE  .e.AZ".-W@V...2.
#     0030: 2C BD E9 47 92 82 BA B8   45 BD B4 74 67 52 B0 40  ,..G....E..tgR.@
#     0040: 1D 44 4F 21 6A 5B DF 8D   3B 70 BF F3 4F C6 DF 37  .DO!j[..;p..O..7
#     0050: C7 91 F4 38 AE 38 34 3F   5F 5F 45 B8 01 2B 4E 54  ...8.84?__E..+NT
#     0060: F2 12 C2 3C FC D4 95 1B   FE 4C 7D 5D FB 61 D3 51  ...<.....L.].a.Q
#     0070: 4A E1 85 80 4B 3C 91 FA   1D 79 C6 AF 42 35 FF 5E  J...K<...y..B5.^
#     0080: 6C 30 84 8C 61 71 B3 43   29 E3 D0 31 4E 0E 59 F1  l0..aq.C)..1N.Y.
#     0090: 54 BF 36 F6 97 61 B0 40   62 FF D4 B8 EB 2F FA 5B  T.6..a.@b..../.[
#     00A0: 32 2C 25 16 AA 05 64 C0   EE 68 AD 07 5A 7F C8 C9  2,%...d..h..Z...
#     00B0: 29 7F 0F 16 CE BA 9D CC   F1 27 EE E8 16 AB 39 2D  )........'....9-
#     00C0: BF 8F DE 21 F6 F9 F4 7A   78 F4 22 1F 51 49 4A A6  ...!...zx.".QIJ.
#     00D0: 80 73 39 77 03 94 EA 21   3F AD 16 71 C9 FB 19 50  .s9w...!?..q...P
#     00E0: E8 2C C4 DD B2 46 57 75   B7 53 50 60 29 4C A3 92  .,...FWu.SP`)L..
#     00F0: F8 EF 67 5C BE FA 54 83   14 E9 10 31 C7 AB 7D 5F  ..g\..T....1..._
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.000 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 65 CB 1E 02 BE 1C EE FA   BB 26 D6 C7 00 B4 9B D7  e........&......
#     0010: 41 B8 BC 84 92 E0 A6 94   B8 0F FF A4 9E 7B 69 00  A.............i.
#     0020: A1 7B 7A 2B F3 24 D0 AB   5A 88 35 0A BD EC C3 B8  ..z+.$..Z.5.....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.001 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:15.002 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.003 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.005 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F F8 44 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:59.000 UTC",
#       "not  after"         : "2024-01-16 15:49:59.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 BF 26 F9 41 9C 70 60   DA 30 23 61 98 63 D3 26  ..&.A.p`.0#a.c.&
#           0010: 40 C0 AE 0B                                        @...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 21 80 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:53.000 UTC",
#       "not  after"         : "2024-01-16 15:49:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#           0010: 9D A4 78 7E                                        ..x.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.072 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 65 3F 53 7A 97 ED F1 2E   9A 1D 8F 5A E1 85 7D 0B  e?Sz.......Z....
#     0010: E0 AE D1 2D D4 E7 07 C7   23 08 61 FD F6 55 BF 32  ...-....#.a..U.2
#     0020: 12 1F F7 D4 DD 1D 71 66   16 4B 00 E9 A3 B6 9A B5  ......qf.K......
#     0030: CB 28 A1 F4 F4 CC 5B 03   68 22 3C 62 BA 15 B7 9A  .(....[.h"<b....
#     0040: C1 F4 EB 1B 3C 58 B5 D1   CF D8 67 53 7D 0B B3 29  ....<X....gS...)
#     0050: B1 A8 54 41 C0 23 96 03   2A EE A7 79 60 A9 F1 F2  ..TA.#..*..y`...
#     0060: 28 35 BE 05 C1 6F 1A 16   1F 6D 7B 45 2D 7B ED 0E  (5...o...m.E-...
#     0070: 83 51 3D 18 0A 9B 85 04   07 4D 35 DB 72 5F 64 A4  .Q=......M5.r_d.
#     0080: 43 62 BC C4 DF 38 F3 D5   D0 F5 00 10 E4 C2 80 7E  Cb...8..........
#     0090: B7 D2 5B 5B 28 F8 3C 52   4A F6 14 0D F6 EB 4E 45  ..[[(.<RJ.....NE
#     00A0: 3A 84 44 CA 78 19 95 03   6B B8 48 DC F8 B5 CF 29  :.D.x...k.H....)
#     00B0: 1D CE 4F 41 AB 63 31 16   EB E6 B3 27 E8 DE A2 0B  ..OA.c1....'....
#     00C0: AE 79 F9 BC A8 DC 3F 81   51 58 90 B7 FA 65 7D 2F  .y....?.QX...e./
#     00D0: 8C 20 A0 7B 13 D9 5C 80   80 99 3A 01 E5 D7 79 27  . ....\...:...y'
#     00E0: D0 30 36 F8 73 D8 6F 31   30 18 FB 03 21 0D E0 E6  .06.s.o10...!...
#     00F0: 01 D0 9A 7B C2 CE 4A 08   70 E3 8C 04 94 80 85 0D  ......J.p.......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.082 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 02 D6 B1 DA 3A D9 1A D6   DE 19 56 C9 90 2C B3 A2  ....:.....V..,..
#     0010: 6C 2A A8 C1 A9 7F 52 F2   71 2D 0E 2D FE 91 05 AE  l*....R.q-.-....
#     0020: E6 36 E3 21 B9 87 D4 9E   B2 E6 F9 E5 B3 45 BE 1E  .6.!.........E..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.082 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:15.122 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:15.122 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:15.122 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:15.122 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:15.191 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F4 08 93 B9 01 74 4D 16 24 5B 1D 3A 7A C4 8A 3D AB F1 8F F4 CA 17 81 67 B1 40 44 7A 57 0D 19 8A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 15:50:15.931 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 15:50:15.932 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 15:50:18.200; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 15:50:18.205; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 15:50:18.590; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 15:50:18.593; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@1a1da881(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 15:50:18.595; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5b970f7(ca,h=[localhost],a=[],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-ZY0ybN/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:18.633 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5F F8 44 99",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:59.000 UTC",
#     "not  after"         : "2024-01-16 15:49:59.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 99 BF 26 F9 41 9C 70 60   DA 30 23 61 98 63 D3 26  ..&.A.p`.0#a.c.&
#         0010: 40 C0 AE 0B                                        @...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:18.637 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "0F 19 6E 3A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:50.000 UTC",
#     "not  after"         : "2024-01-16 15:49:50.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:18.649 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:18.816 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.816 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:18.818 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:18.818 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.822 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.836 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.836 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.836 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:18.838 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "FD B9 6F 4F 0C E7 5B BC 2D 58 64 43 75 B0 2B 53 E4 51 ED F0 95 30 D4 9D 36 1E 16 66 C8 BB 87 DC",
#   "session id"          : "1D 89 42 71 0A 0B 0D C9 BC AF 33 5A 6F 9A 94 E9 CD 4C 67 78 01 F2 06 DE CD 54 10 BF 6D 33 7C 87",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: BE 4F F4 53 80 06 8F E5   AB BC 8C C3 AD 09 31 F4  .O.S..........1.
#             0010: 20 49 35 14 41 B7 9E 9E   B0 F3 28 78 EB 5D 03 65   I5.A.....(x.].e
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.961 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "59 67 FF 10 19 AB A6 90 D0 F9 47 51 6F 2C C0 61 32 86 50 A9 B1 A1 89 F2 2E 63 61 DE 9C F5 5C B2",
#   "session id"          : "1D 89 42 71 0A 0B 0D C9 BC AF 33 5A 6F 9A 94 E9 CD 4C 67 78 01 F2 06 DE CD 54 10 BF 6D 33 7C 87",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: C7 49 06 7C 8A 85 0C 16   5D 6F BE EF 8F D8 AB 7C  .I......]o......
#           0010: 10 D0 52 51 A0 F2 75 D1   15 E1 FA 3C 25 F6 AA 7A  ..RQ..u....<%..z
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.961 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.961 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.962 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.964 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.964 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.964 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.964 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.965 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.966 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.980 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.982 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.983 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.998 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.998 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.998 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.999 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.999 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:18.999 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.004 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.004 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.006 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.006 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.006 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.006 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.007 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.007 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.008 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.010 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 12 B2 3B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:55.000 UTC",
#       "not  after"         : "2024-01-16 15:49:55.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: E1 9A E6 D1 7F D5 F2 99   B7 9C A8 4A 54 B6 52 03  ...........JT.R.
#           0010: AD 94 E5 14                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.010 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.059 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "66 21 80 1B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 15:49:53.000 UTC",
#     "not  after"         : "2024-01-16 15:49:53.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#         0010: 9D A4 78 7E                                        ..x.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#         0010: 44 86 CF B9                                        D...
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.062 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D 06 5C DA 44 E3 CD F3   BB 52 A5 FD AD E7 2C 61  ..\.D....R....,a
#     0010: B6 F3 80 64 7D 38 F8 16   6B 9D DD 6B 08 BF 17 37  ...d.8..k..k...7
#     0020: 56 7D 14 C0 2A 6F 23 2A   7E 8D 4F 44 3C BF 74 E1  V...*o#*..OD<.t.
#     0030: 53 B7 1E 8B AC 15 2F CA   A8 26 06 75 6C 15 B7 DC  S...../..&.ul...
#     0040: 62 57 9F 33 C8 0E FA EF   9C 47 43 DB 1B 05 E5 4C  bW.3.....GC....L
#     0050: A6 C0 EB 2D F4 4E 47 23   A6 EE 0C A4 17 82 4C 48  ...-.NG#......LH
#     0060: F1 66 C6 37 E0 38 FD 03   4B BA 85 A6 64 FE 5F 14  .f.7.8..K...d._.
#     0070: 04 06 2A F3 8E 25 99 DB   D5 52 E9 6C FF 4F C9 C2  ..*..%...R.l.O..
#     0080: D4 04 FD 82 BF 88 F5 FB   E9 BA 86 5B 62 1C A8 C3  ...........[b...
#     0090: 83 81 F7 F4 A8 48 62 76   0B 64 E8 04 B1 7B C4 4B  .....Hbv.d.....K
#     00A0: 5F EA E0 86 04 56 89 EE   1C 4D 05 3E DB 85 38 EF  _....V...M.>..8.
#     00B0: A9 6D 44 48 A5 00 25 86   4F 0E 1A A3 9D A7 C0 FC  .mDH..%.O.......
#     00C0: 53 5D 89 02 07 AF BB 51   B6 A4 8D 61 6B 89 53 15  S].....Q...ak.S.
#     00D0: 08 15 FD E9 87 64 03 7E   2A 8B 49 84 7A 0F C2 EA  .....d..*.I.z...
#     00E0: DF 7F 13 73 1B D1 CB DB   4E E4 0E 17 B5 0D 8D EE  ...s....N.......
#     00F0: 43 0D 99 7A DA A1 A1 88   88 90 51 C6 F3 4F 03 06  C..z......Q..O..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.063 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3B 46 CB AF 0B 7C AB C0   C9 19 7F DD 46 41 1A 53  ;F..........FA.S
#     0010: 43 10 B6 18 3D 05 1F 7E   E3 AB 66 1A D3 2E B7 B2  C...=.....f.....
#     0020: 46 BB C5 2D BA ED 8F AC   2D 91 16 9D B3 0C CB 13  F..-....-.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.065 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:19.066 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.067 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.069 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5F F8 44 99",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:59.000 UTC",
#       "not  after"         : "2024-01-16 15:49:59.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 99 BF 26 F9 41 9C 70 60   DA 30 23 61 98 63 D3 26  ..&.A.p`.0#a.c.&
#           0010: 40 C0 AE 0B                                        @...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 21 80 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:53.000 UTC",
#       "not  after"         : "2024-01-16 15:49:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#           0010: 9D A4 78 7E                                        ..x.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.092 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7D DA AF 89 6C 93 E1 E6   EA 03 BF 34 43 0E E9 45  ....l......4C..E
#     0010: 3E 58 AA 51 5A 99 04 EB   91 0E 4B FF 03 53 0F FE  >X.QZ.....K..S..
#     0020: 61 27 21 33 26 54 49 C6   41 B9 A5 15 E3 85 BB 33  a'!3&TI.A......3
#     0030: 12 05 4D 5B 1C E5 FE 88   DC BA CE 80 09 BB 6D 86  ..M[..........m.
#     0040: 44 26 05 65 CA 02 0E 83   2D 06 3D 4D 02 71 71 4A  D&.e....-.=M.qqJ
#     0050: C7 E3 71 24 B5 16 0C B2   1F 8D 66 DA E8 D5 C2 BA  ..q$......f.....
#     0060: E4 53 9C DE E5 96 34 3E   80 A6 42 9F 23 F3 3C 1E  .S....4>..B.#.<.
#     0070: B3 71 40 89 20 5E 60 A9   B9 6D D7 B6 B5 B6 EB AF  .q@. ^`..m......
#     0080: 89 35 B8 1F 10 89 A6 94   CE C6 D0 01 FF 53 2E 44  .5...........S.D
#     0090: 63 DC 0D 71 76 7E 5E B2   FB CF 8A F8 62 E0 8E 8E  c..qv.^.....b...
#     00A0: 99 FB F3 3D C1 61 F2 5C   BE D8 4C 1C 10 54 4E 88  ...=.a.\..L..TN.
#     00B0: DA C4 0D 0D EC 14 A7 80   26 A2 6D 58 F1 9A 11 D2  ........&.mX....
#     00C0: 85 E9 19 CE 14 C8 27 15   8C 9B AA A5 94 17 BA 6B  ......'........k
#     00D0: 2A E5 5F F5 BE AC 49 98   5C 67 77 57 3A 88 C7 5B  *._...I.\gwW:..[
#     00E0: 38 CB E6 43 25 48 9C 57   4C 24 45 F5 8F 59 3E 90  8..C%H.WL$E..Y>.
#     00F0: 51 5D 06 D2 C1 F2 58 7F   AC EF 69 05 EF FB D8 82  Q]....X...i.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.093 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0B 5B 1A 81 C7 62 C9 B3   D6 5A AB 72 CF AA 87 79  .[...b...Z.r...y
#     0010: 81 AD A1 A3 5F 72 64 3F   D2 3B 98 0E B6 63 88 B4  ...._rd?.;...c..
#     0020: 88 0C 5C C6 EE 59 53 A3   FD 09 EA B7 26 0F 71 F7  ..\..YS.....&.q.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.094 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:19.142 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "16 42 0D 42 81 A2 4E 9B F6 AB 5F FE FB E6 AF 12 7A 77 77 A7 42 F6 5F DA 3B 49 41 92 81 BC DA 86",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:19.397 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:19.397 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:19.397 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 15:50:19.397 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-18 15:50:19.436 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 15:50:19.437 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-18 15:50:33.216; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:33.567 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "0F 19 6E 3A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:50.000 UTC",
#       "not  after"         : "2024-01-16 15:49:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#           0010: 9D A4 78 7E                                        ..x.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "66 21 80 1B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 15:49:53.000 UTC",
#       "not  after"         : "2024-01-16 15:49:53.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 0F 6B E8 18 F5 98 3B 02   16 95 6F DB 49 E2 10 FA  .k....;...o.I...
#           0010: 9D A4 78 7E                                        ..x.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: DB 32 CC 88 5A 0D 8C 57   55 EE B2 0F AF 80 B7 EA  .2..Z..WU.......
#           0010: 44 86 CF B9                                        D...
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 15:50:33.581 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:33.749 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.749 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:33.751 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 15:50:33.751 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.755 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.766 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.766 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.767 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 15:50:33.769 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "3E A0 32 BA 4E 56 D7 16 7D 81 AE 49 58 61 C5 D4 CD 67 FA A6 F3 25 11 49 10 3A E1 E6 32 07 49 27",
#     "session id"          : "34 2F 3A 54 65 22 24 63 14 80 03 44 02 90 C3 70 3E F4 3D F6 2E 51 15 FF 57 6E 6A BF 38 E2 B6 64",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: A8 1E AE C3 A7 C7 54 7F   D9 5B D5 DC 82 16 66 B6  ......T..[....f.
#               0010: F4 AA AF 37 7A 21 AC 0F   88 30 5A EA 3C BB 0D 17  ...7z!...0Z.<...
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.786 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "43 1A 44 2A BD DC 07 69 0F 96 00 02 66 BA 77 EC 68 4B 87 AA 72 5B 0D 11 4F D4 FB 03 4C 2D 80 22",
#     "session id"          : "34 2F 3A 54 65 22 24 63 14 80 03 44 02 90 C3 70 3E F4 3D F6 2E 51 15 FF 57 6E 6A BF 38 E2 B6 64",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D8 5A 13 BB 07 69 6F 5E   D3 8F 8F 78 58 2B C7 99  .Z...io^...xX+..
#             0010: D0 03 57 AA 13 C7 37 AD   6E A5 F2 34 E0 DC C1 55  ..W...7.n..4...U
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.787 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.787 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.787 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.788 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.790 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.791 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.799 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.800 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.803 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 15:50:33.806 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, 

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 17980ms
ok 78 stop command for single port in 21775ms
not ok 79 status detects locally running solr in 1541ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7588ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1499ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 3086ms
ok 83 copying files around in 6680ms
ok 84 upconfig in 2618ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1243ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1254ms
not ok 87 Cleanup in 2508ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 5m 50s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vfo457tri3i2e

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8213 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8213/

All tests passed

Build Log:
[...truncated 1260 lines...]
# ERROR: Error from server at http://localhost:39301/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 15892ms
ok 60 Check help command in 4627ms
ok 61 basic post with a type specified in 5663ms
ok 62 basic post WITHOUT a type specified in 11822ms
ok 63 crawling a directory in 4398ms
ok 64 crawling a web site in 4872ms
ok 65 commit and optimize and delete in 3885ms
ok 66 args mode in 6549ms
ok 67 stdin mode in 3507ms
ok 68 post solr log into solr via script in 10268ms
ok 69 post solr log into solr via cli in 7641ms
ok 70 allowPaths - backup in 17015ms
ok 71 start solr with ssl in 18357ms
not ok 72 use different hostname when not checking peer-name in 20680ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 39301 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39301 (pid=1785805). Happy searching!
#
#     INFO  - 2023-10-18 13:02:52.054; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:02:52.059; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 13:02:52.449; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 13:02:52.531; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-18 13:02:52.534; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-18 13:03:02.628; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-18 13:03:02.633; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-18 13:03:03.035; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:39301/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-18 13:03:04.526; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:03:04.531; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:39301/solr] to [https://127.0.0.1:39301].
# WARN  - 2023-10-18 13:03:05.318; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-18 13:03:05.358; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 17972ms
ok 74 start solr with client truststore and security manager in 19633ms
not ok 75 start solr with mTLS needed in 50841ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-Su79zQ/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 39301 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39301 (pid=1788484). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 39302 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39302 (pid=1788597). Happy searching!
#
#     INFO  - 2023-10-18 13:04:07.884; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:04:07.889; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 13:04:09.256; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:04:09.259; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:04:09.260; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:09.302 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 FF E1 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:54.000 UTC",
#     "not  after"         : "2024-01-16 13:03:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E AD 76 01 C9 BC 85 EC   03 18 D4 81 3D B4 69 47  ..v.........=.iG
#         0010: 6D BB 68 07                                        m.h.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:09.312 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 A0 C0 F4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:46.000 UTC",
#     "not  after"         : "2024-01-16 13:03:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:09.326 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:09.725 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.726 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:09.727 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:09.727 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.732 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.742 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.742 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:09.745 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "92 FF 8E C7 E9 90 60 47 5E 5C 31 B3 49 31 39 14 78 A9 01 5C F7 EB C3 59 31 82 BF 2C 56 50 A4 83",
#   "session id"          : "F4 85 20 30 A1 2E FF 5B 77 50 E0 BB 6D F0 51 C3 B5 F3 C8 3B 27 C8 F6 5A D8 DA D3 6E 31 D8 76 7C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: A9 4D DB 8C 23 74 B7 D7   7D 15 E9 09 ED 61 BC CD  .M..#t.......a..
#             0010: 35 0F 05 63 AD C3 D6 F6   EE C4 06 C1 09 76 53 2F  5..c.........vS/
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.173 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8B 82 5C 6B 4D C1 0D 98 77 5E 5E 50 96 C2 B2 B5 86 DA BF 2E 83 DB 19 7B C4 CD 9D 81 A0 58 24 57",
#   "session id"          : "F4 85 20 30 A1 2E FF 5B 77 50 E0 BB 6D F0 51 C3 B5 F3 C8 3B 27 C8 F6 5A D8 DA D3 6E 31 D8 76 7C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: F3 12 71 E9 DE 12 4B 70   17 66 85 9D 68 AC 37 2B  ..q...Kp.f..h.7+
#           0010: 26 38 D5 2B 7A EC D5 7B   39 BF 3A A5 76 26 BF 5C  &8.+z...9.:.v&.\
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.174 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.174 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.175 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.176 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.176 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.180 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.180 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.180 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.180 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.181 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.190 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.190 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.190 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.190 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.192 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.205 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.206 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.207 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.210 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.210 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.211 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.212 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.213 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.213 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.213 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.214 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.214 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.214 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.227 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 20 BB A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:50.000 UTC",
#       "not  after"         : "2024-01-16 13:03:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 EF AA 49 B9 FD 18 0B   3A DA C3 A3 6B A6 AC 19  U..I....:...k...
#           0010: 98 E6 8F B2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.228 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.336 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.344 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 11 FB 21 61 3B 68 80 87   FA 59 27 C5 08 AF 79 B7  ..!a;h...Y'...y.
#     0010: 22 0B EA 38 9B D1 FF CB   48 40 EF F1 06 96 3B 9E  "..8....H@....;.
#     0020: 33 1A 8C 45 88 A0 F3 AD   6A 7B F2 9E 7A 37 54 78  3..E....j...z7Tx
#     0030: 81 69 F3 8E 2F 3A 07 CD   95 54 7E 71 F3 9D D3 73  .i../:...T.q...s
#     0040: AB F6 A7 E3 20 39 E9 E4   C1 CA 25 48 8B FC DC C5  .... 9....%H....
#     0050: D9 3B 38 D5 95 CD FA 9B   33 58 E6 68 40 29 58 C5  .;8.....3X.h@)X.
#     0060: AA FE D4 B2 F9 E4 0F 07   8A 07 F7 98 1C 06 95 20  ...............
#     0070: 78 1B 9A 5E 7B E0 78 2B   00 22 0C 88 23 14 9A 71  x..^..x+."..#..q
#     0080: B9 30 CB C0 36 B2 1F D8   80 30 11 C2 7B F4 32 D5  .0..6....0....2.
#     0090: F0 49 59 8B 69 3E 0D 04   68 EC 7C E1 00 B3 C9 0B  .IY.i>..h.......
#     00A0: 81 B0 63 1E 69 43 16 9A   49 B0 05 A0 D1 C8 05 97  ..c.iC..I.......
#     00B0: EE 95 EF C6 77 A1 A3 69   32 4F 79 32 3F D6 A3 48  ....w..i2Oy2?..H
#     00C0: 47 CD AD BA 11 E3 43 7C   08 85 7F 75 22 F4 39 84  G.....C....u".9.
#     00D0: E0 31 38 DD FA 9D 89 8A   17 1F 0F 2B 53 F8 EF F6  .18........+S...
#     00E0: 23 21 B3 6E 92 01 05 37   70 BF 76 0D F1 D7 55 C8  #!.n...7p.v...U.
#     00F0: EE 26 18 CF 68 CE 3F A0   8F 63 83 83 EA 32 23 87  .&..h.?..c...2#.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.345 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 33 99 9E 1B 97 A3 4E DB   D4 D1 B9 01 A5 FA 61 2E  3.....N.......a.
#     0010: 8F C1 38 8B 6D 3C D8 57   E5 D8 09 9E E2 4E C7 92  ..8.m<.W.....N..
#     0020: 4A 71 3F C4 63 85 06 44   88 9B 03 1A DF AA C3 40  Jq?.c..D.......@
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.642 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:10.643 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.643 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:10.643 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.643 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:10.644 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:10.644 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.644 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.647 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 FF E1 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:54.000 UTC",
#       "not  after"         : "2024-01-16 13:03:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E AD 76 01 C9 BC 85 EC   03 18 D4 81 3D B4 69 47  ..v.........=.iG
#           0010: 6D BB 68 07                                        m.h.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 04 5B 10",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:48.000 UTC",
#       "not  after"         : "2024-01-16 13:03:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#           0010: F0 8B 3B 18                                        ..;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.684 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 12 E1 95 35 D2 0F 1D 79   D1 DC C9 2E D4 41 1D EB  ...5...y.....A..
#     0010: D6 D7 ED C4 0F 7F 45 61   44 0C DD A0 45 3A 48 06  ......EaD...E:H.
#     0020: 7A E0 C5 8A 71 BE F7 B4   A4 25 71 F4 6B B9 89 0E  z...q....%q.k...
#     0030: 79 11 FA 8A 87 15 1A E8   0A 0D 1F 1F BA 40 C9 63  y............@.c
#     0040: 03 26 80 BE 05 0F E1 AE   6A CB 53 F0 23 64 9F 31  .&......j.S.#d.1
#     0050: E6 6C A1 73 8F 41 65 E4   4B 64 B1 43 9F 40 BA F4  .l.s.Ae.Kd.C.@..
#     0060: DF 0F FF 66 1E 8B 4F 6D   FF 8D 5C 67 16 BD 47 3B  ...f..Om..\g..G;
#     0070: C0 4F 52 1B 8E 49 A7 B8   92 F7 7A 16 9E 46 F7 CC  .OR..I....z..F..
#     0080: 47 B3 04 A6 B1 6F A7 86   63 42 40 32 70 7A 2A 83  G....o..cB@2pz*.
#     0090: 58 BC D1 13 A8 3A 85 FA   30 15 EA 4E 90 60 AA 1C  X....:..0..N.`..
#     00A0: BA 9B 50 E2 25 A8 5E A7   33 B2 2E 67 21 16 4B AF  ..P.%.^.3..g!.K.
#     00B0: 05 7D 52 A1 2B 7D FE 23   05 AC 98 C9 98 D9 A1 B5  ..R.+..#........
#     00C0: 73 D4 0A CF 95 69 39 53   24 A3 66 56 FB 83 10 1E  s....i9S$.fV....
#     00D0: 5C 0F EF AA C4 74 E9 64   A7 8E 68 28 9F 74 77 24  \....t.d..h(.tw$
#     00E0: 1F AA F9 61 4E 0C 69 5D   9F 09 57 7F 53 A5 77 AF  ...aN.i]..W.S.w.
#     00F0: 89 0B 54 90 5F 17 07 1E   DD F4 43 6E FD 0A 9F 74  ..T._.....Cn...t
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.685 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E5 21 36 8B 5D 34 68 2F   E8 3C FA FA A1 2A E0 80  .!6.]4h/.<...*..
#     0010: 69 77 C2 7A 45 CE 38 42   1E 7B 3D 71 BD 07 B3 D9  iw.zE.8B..=q....
#     0020: 51 4A B1 A1 D7 D7 83 FA   A1 33 50 DB 0A B1 39 C7  QJ.......3P...9.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.686 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:04:10.701 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:04:10.701 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:04:10.701 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-18 13:04:10.701 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:10.781 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "EF FC B7 62 FF 18 5B D6 69 F8 96 E7 A0 18 0B 23 15 D1 33 8A C8 89 00 37 A8 82 A7 B9 33 9E 3E C6",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 13:04:11.432 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 13:04:11.433 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-18 13:04:12.585; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-18 13:04:12.590; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-18 13:04:12.916; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:04:12.918; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-18 13:04:12.918; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-Su79zQ/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:12.949 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "27 FF E1 76",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:54.000 UTC",
#     "not  after"         : "2024-01-16 13:03:54.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 1E AD 76 01 C9 BC 85 EC   03 18 D4 81 3D B4 69 47  ..v.........=.iG
#         0010: 6D BB 68 07                                        m.h.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:12.952 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "26 A0 C0 F4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:46.000 UTC",
#     "not  after"         : "2024-01-16 13:03:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:12.963 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:13.144 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.145 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:13.146 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:13.147 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.151 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.163 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.163 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.163 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:13.165 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "91 3F 24 D3 99 C4 61 40 43 DA 79 11 5A E0 C8 12 E1 15 7E 5D 6B F2 EF B1 92 80 75 D4 2F 38 4A C3",
#   "session id"          : "B5 6C 99 57 6D 58 B9 B5 93 01 4E 04 9E 84 F3 DA 4A 94 82 1A 04 00 06 54 8B AA 52 BF F6 64 D1 B6",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1A 39 64 43 05 11 11 DC   57 9C FA E3 FC FC 73 01  .9dC....W.....s.
#             0010: 25 E8 03 DF 9C 3B 3D 14   54 B0 D8 9E 48 0E 00 73  %....;=.T...H..s
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.260 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "0D 30 0A E5 8C 05 BF 72 FC CF 22 22 74 C4 A3 56 77 98 68 90 31 A5 AA 73 8D D4 A4 F4 3C 92 AC DD",
#   "session id"          : "B5 6C 99 57 6D 58 B9 B5 93 01 4E 04 9E 84 F3 DA 4A 94 82 1A 04 00 06 54 8B AA 52 BF F6 64 D1 B6",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 69 7B 78 41 C9 A2 7F 3C   1B 0A F2 25 88 53 CF 6A  i.xA...<...%.S.j
#           0010: 9E 60 07 DF 09 1E 75 E3   C3 41 9C 29 7F DC 03 3D  .`....u..A.)...=
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.261 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.261 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.262 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.263 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.265 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.265 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.265 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.265 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.267 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.287 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.288 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.290 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.293 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.293 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.293 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.293 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.294 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.294 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.294 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.294 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.294 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.299 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.299 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.299 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.300 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.308 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.309 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.309 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.312 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "34 20 BB A5",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:50.000 UTC",
#       "not  after"         : "2024-01-16 13:03:50.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 55 EF AA 49 B9 FD 18 0B   3A DA C3 A3 6B A6 AC 19  U..I....:...k...
#           0010: 98 E6 8F B2                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.312 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.511 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2B 04 5B 10",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-18 13:03:48.000 UTC",
#     "not  after"         : "2024-01-16 13:03:48.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#         0010: F0 8B 3B 18                                        ..;.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#         0010: 7C 23 72 98                                        .#r.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.514 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6F F8 44 C6 55 FC F6 AA   12 E1 3D 9A FD 0B 4F FE  o.D.U.....=...O.
#     0010: 2D 15 AA BD E1 41 C1 0D   92 CB 41 BA 3F F9 70 03  -....A....A.?.p.
#     0020: 6E 09 FC 11 40 7B C0 A7   6E BB 87 0F 41 57 46 2B  n...@...n...AWF+
#     0030: B0 DE FB 49 2A E5 F4 05   45 3E 49 B5 D2 D9 7A 00  ...I*...E>I...z.
#     0040: 4D E5 C0 21 48 0D BA F2   A9 DD E0 0F 92 8F A4 54  M..!H..........T
#     0050: A9 9C 99 55 3E DE B1 A8   F6 8F BD 06 41 0D 8F 25  ...U>.......A..%
#     0060: A5 C9 13 93 39 80 12 3B   BE A8 58 AA 9B 55 8F 6B  ....9..;..X..U.k
#     0070: 81 F7 AE 01 CB 12 1A 76   F8 F8 23 66 1C 78 B1 61  .......v..#f.x.a
#     0080: 4D B1 A1 6D 3E 21 7B 34   0A BA 47 4F BC 18 06 DC  M..m>!.4..GO....
#     0090: 35 6C EC 5C 53 83 81 A5   2F CC FE F5 3C 78 88 4E  5l.\S.../...<x.N
#     00A0: 0D B4 9F 22 30 36 BC 3C   17 0B E2 E7 6E 4D 66 9A  ..."06.<....nMf.
#     00B0: D3 37 9B 2B 27 A6 BE C5   AE CB CB 80 41 04 52 4C  .7.+'.......A.RL
#     00C0: BF B1 4A A0 2F E4 26 AA   45 2D 24 90 91 AC BE 50  ..J./.&.E-$....P
#     00D0: D8 ED 92 D2 2C D7 2E 09   D7 9D 6B 0A 05 F3 2E 23  ....,.....k....#
#     00E0: B6 34 8E C3 DF 5E 4F 98   8B FE 1D 61 C9 45 80 0E  .4...^O....a.E..
#     00F0: 13 1D BE 81 EF 1C DE 19   F1 93 FA 07 55 43 BB 90  ............UC..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.516 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 14 E9 A2 C7 34 B6 C0 6A   79 8A F4 9C FC 65 F3 D0  ....4..jy....e..
#     0010: B8 9A 28 02 54 30 76 10   22 F8 76 F8 6F 15 0E 27  ..(.T0v.".v.o..'
#     0020: D0 2E 31 44 43 4D 06 5E   57 16 9A 42 0E 86 2E 08  ..1DCM.^W..B....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.517 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:13.518 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.518 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:13.519 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.519 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-18 13:04:13.519 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:13.519 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.519 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.521 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "27 FF E1 76",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:54.000 UTC",
#       "not  after"         : "2024-01-16 13:03:54.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 1E AD 76 01 C9 BC 85 EC   03 18 D4 81 3D B4 69 47  ..v.........=.iG
#           0010: 6D BB 68 07                                        m.h.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 04 5B 10",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:48.000 UTC",
#       "not  after"         : "2024-01-16 13:03:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#           0010: F0 8B 3B 18                                        ..;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.542 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 51 10 66 5E A8 9E 81 24   76 6D 98 92 2A 00 41 03  Q.f^...$vm..*.A.
#     0010: E4 0E 11 8B DB E1 A1 E7   38 F4 AC 1F 00 AF C0 72  ........8......r
#     0020: 26 A7 21 4A 05 02 31 54   CC A4 63 F2 81 F1 87 36  &.!J..1T..c....6
#     0030: FF BB DF A0 2C 7F 3F 92   73 FD D1 C2 F0 6B 3B 57  ....,.?.s....k;W
#     0040: C1 0B 75 7E 24 46 B7 CC   88 80 2D 8F 15 E2 78 59  ..u.$F....-...xY
#     0050: 6F 27 F0 74 09 B7 E8 C9   91 6F 0E 07 82 11 3B DE  o'.t.....o....;.
#     0060: 60 50 3D E3 8B 12 14 B1   F1 19 74 10 50 0F 72 30  `P=.......t.P.r0
#     0070: AE A7 0E D1 45 17 57 00   16 F2 A1 AC 38 B6 F1 19  ....E.W.....8...
#     0080: A2 AC C4 75 77 EC 15 83   F9 BF 0A DA 7A 8D 66 13  ...uw.......z.f.
#     0090: 20 EB D7 62 3C F5 49 91   F6 83 5F B7 4F D4 5C 6A   ..b<.I..._.O.\j
#     00A0: 6A FD 00 6E 98 C8 E9 9F   24 89 B7 4F 51 C1 29 4E  j..n....$..OQ.)N
#     00B0: B8 EB A4 10 2C C8 00 75   F0 9C 70 D3 FB 0A 3C 48  ....,..u..p...<H
#     00C0: D8 64 4F 21 51 41 19 03   AE 5B 65 F1 FC 94 C6 4B  .dO!QA...[e....K
#     00D0: 19 51 DE F8 F6 96 BE 94   15 15 B3 28 04 BF 2F 55  .Q.........(../U
#     00E0: AE 3A C9 4F 63 2A 06 02   AC 6A 6A 2E 85 B2 21 DF  .:.Oc*...jj...!.
#     00F0: 18 BB E0 D1 98 0F 01 8E   31 CB 1B FD 82 FF F4 DF  ........1.......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.543 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0A 9F 8E 01 E5 60 8D 29   24 37 BA D8 90 15 93 1A  .....`.)$7......
#     0010: E6 63 A1 C1 18 2B 38 27   D7 07 46 2C 45 4C 78 E0  .c...+8'..F,ELx.
#     0020: 26 78 88 8A 64 45 86 C2   B6 EF 9F 48 2C 21 18 C1  &x..dE.....H,!..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.544 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:13.600 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C0 EC 9D EC DE FA ED 83 74 D9 A0 64 1D 54 CF 6E 93 07 12 5D FD 4E 52 04 9A FD 1A E5 4F 08 E4 3B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-18 13:04:13.856 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-18 13:04:13.860 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-18 13:04:26.957; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:27.273 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "26 A0 C0 F4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:46.000 UTC",
#       "not  after"         : "2024-01-16 13:03:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#           0010: F0 8B 3B 18                                        ..;.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2B 04 5B 10",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-18 13:03:48.000 UTC",
#       "not  after"         : "2024-01-16 13:03:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C6 74 45 C0 E1 57 A5 25   87 47 05 BC 9B A2 F7 66  .tE..W.%.G.....f
#           0010: F0 8B 3B 18                                        ..;.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED 9D BF D7 FA 17 FB 26   17 46 D0 0A 91 4B 96 4F  .......&.F...K.O
#           0010: 7C 23 72 98                                        .#r.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-18 13:04:27.286 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:27.551 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.551 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:27.553 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-18 13:04:27.553 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.557 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.568 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.568 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.569 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-18 13:04:27.571 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "08 D0 0B 14 A2 B8 23 72 99 B7 38 6B 15 F3 BA 6F 97 62 64 44 DC FF FD F6 CB 5A F2 ED 27 B1 B4 CB",
#     "session id"          : "E4 B1 A1 0D 8A 70 74 F8 3A 3A 87 F1 B9 3E ED 46 51 48 3D 45 D9 30 E9 54 EC D1 17 EA 4D B3 FF 25",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 7C 49 C5 5B 45 0E C3 5F   36 B5 68 96 0A F3 64 34  .I.[E.._6.h...d4
#               0010: A2 8F 41 E0 37 DD 1B 28   68 C1 D7 8B E6 28 F4 4F  ..A.7..(h....(.O
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.591 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "42 A1 45 20 73 FA 0C 23 E8 A1 B0 7B B6 1C 85 7E 35 67 13 BE 3C 2E 01 80 6A 7E 17 47 AD 07 84 C5",
#     "session id"          : "E4 B1 A1 0D 8A 70 74 F8 3A 3A 87 F1 B9 3E ED 46 51 48 3D 45 D9 30 E9 54 EC D1 17 EA 4D B3 FF 25",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: D4 20 19 C4 48 F0 AD 78   09 43 0E F9 24 CE E9 81  . ..H..x.C..$...
#             0010: F1 67 C3 D1 88 91 9A 4A   A6 9D 2A A4 8B 13 FD 13  .g.....J..*.....
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.591 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.591 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.592 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.593 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.594 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.594 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.594 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.594 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.595 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.604 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.605 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.606 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.610 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
#   "EncryptedExtensions": [
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     }
#   ]
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.610 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.610 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-18 13:04:27.610 UTC

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14457ms
ok 78 stop command for single port in 18419ms
not ok 79 status detects locally running solr in 1547ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/79-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7513ms
not ok 81 status help flag outputs message highlighting not to use solrUrl. in 1456ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/81-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 82 listing out files in 2837ms
ok 83 copying files around in 6522ms
ok 84 upconfig in 2687ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1237ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1236ms
not ok 87 Cleanup in 2515ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 1220625 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 1220625 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 11s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/mhuqb72gtjeno

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8212 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8212/

2 tests failed.
FAILED:  org.apache.solr.cloud.DeleteReplicaTest.raceConditionOnDeleteAndRegisterReplica

Error Message:
java.lang.AssertionError: Failed to delete replica

Stack Trace:
java.lang.AssertionError: Failed to delete replica
	at __randomizedtesting.SeedInfo.seed([C61635BC72FA63AC]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.cloud.DeleteReplicaTest.lambda$raceConditionOnDeleteAndRegisterReplica$10(DeleteReplicaTest.java:407)
	at org.apache.solr.core.ZkContainer.lambda$registerInZk$1(ZkContainer.java:212)
	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.cloud.OverseerTest.testShardLeaderChange

Error Message:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=7135, name=OverseerCollectionConfigSetProcessor-72686850632384514-127.0.0.1:40201_solr-n_0000000000, state=RUNNABLE, group=Overseer collection creation process.]

Stack Trace:
com.carrotsearch.randomizedtesting.UncaughtExceptionError: Captured an uncaught exception in thread: Thread[id=7135, name=OverseerCollectionConfigSetProcessor-72686850632384514-127.0.0.1:40201_solr-n_0000000000, state=RUNNABLE, group=Overseer collection creation process.]
	at __randomizedtesting.SeedInfo.seed([C61635BC72FA63AC:1845B24B6862965D]:0)
Caused by: org.apache.solr.common.AlreadyClosedException
	at __randomizedtesting.SeedInfo.seed([C61635BC72FA63AC]:0)
	at app//org.apache.solr.common.cloud.ZkCmdExecutor.retryOperation(ZkCmdExecutor.java:68)
	at app//org.apache.solr.common.cloud.SolrZkClient.getData(SolrZkClient.java:436)
	at app//org.apache.solr.cloud.OverseerTaskProcessor.amILeader(OverseerTaskProcessor.java:486)
	at app//org.apache.solr.cloud.OverseerTaskProcessor.run(OverseerTaskProcessor.java:171)
	at java.base@11.0.16.1/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 61045 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.DeleteReplicaTest.raceConditionOnDeleteAndRegisterReplica (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.DeleteReplicaTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.DeleteReplicaTest.raceConditionOnDeleteAndRegisterReplica" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=C61635BC72FA63AC -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8

  - org.apache.solr.cloud.OverseerTest.testShardLeaderChange (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.OverseerTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.OverseerTest.testShardLeaderChange" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=C61635BC72FA63AC -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=UTF-8


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 41s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/xqa2ktmasy7um

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8211 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8211/

All tests passed

Build Log:
[...truncated 1391 lines...]
BUILD FAILED in 1h 5m 5s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/4njd7ai7wkobu

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8210 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8210/

All tests passed

Build Log:
[...truncated 1523 lines...]
BUILD FAILED in 1h 5m 53s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/v4cqcsla4yvnq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8209 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8209/

All tests passed

Build Log:
[...truncated 1510 lines...]
BUILD FAILED in 1h 3m 19s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/d5o76wqjogyeq

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8208 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8208/

All tests passed

Build Log:
[...truncated 1549 lines...]
BUILD FAILED in 1h 4m 25s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ku62oqbcjb7us

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8207 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8207/

All tests passed

Build Log:
[...truncated 1151 lines...]
# ERROR: Error from server at http://localhost:35155/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 59 Random placement plugin using ENV in 16168ms
ok 60 Check help command in 4793ms
ok 61 basic post with a type specified in 5643ms
ok 62 basic post WITHOUT a type specified in 11882ms
ok 63 crawling a directory in 4458ms
ok 64 crawling a web site in 4775ms
ok 65 commit and optimize and delete in 4028ms
ok 66 args mode in 6830ms
ok 67 stdin mode in 3524ms
ok 68 post solr log into solr via script in 9997ms
ok 69 post solr log into solr via cli in 7138ms
ok 70 allowPaths - backup in 16462ms
ok 71 start solr with ssl in 18269ms
not ok 72 use different hostname when not checking peer-name in 20485ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 35155 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35155 (pid=3836159). Happy searching!
#
#     INFO  - 2023-10-17 19:16:21.169; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 19:16:21.173; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 19:16:21.552; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 19:16:21.652; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-17 19:16:21.652; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-17 19:16:31.611; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-17 19:16:31.615; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-17 19:16:31.990; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/72/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:35155/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/72-2
# Last output:
# INFO  - 2023-10-17 19:16:33.384; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 19:16:33.389; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:35155/solr] to [https://127.0.0.1:35155].
# WARN  - 2023-10-17 19:16:34.202; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-17 19:16:34.240; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 73 start solr with ssl and auth in 16703ms
ok 74 start solr with client truststore and security manager in 19228ms
not ok 75 start solr with mTLS needed in 52982ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-fUth4V/test/75/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 35155 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 35155 (pid=3838904). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 35156 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]  
# Started Solr server on port 35156 (pid=3839015). Happy searching!
#
#     INFO  - 2023-10-17 19:17:35.956; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 19:17:35.961; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 19:17:37.308; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 19:17:37.310; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 19:17:37.311; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:37.376 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 66 58 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:22.000 UTC",
#     "not  after"         : "2024-01-15 19:17:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 27 5B BC 01 C4 8D 92   E6 7D 03 45 72 29 86 CC  .'[........Er)..
#         0010: 38 4D 54 65                                        8MTe
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:37.383 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 71 E4 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:13.000 UTC",
#     "not  after"         : "2024-01-15 19:17:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:37.396 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:37.761 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.762 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:37.768 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:37.769 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.777 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.810 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.810 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.811 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:37.825 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F7 7B AB 35 21 7D ED 96 C4 D8 E1 9B AE 43 B8 C7 04 32 2E 0F B9 E0 70 16 99 29 45 BE 82 38 2A B4",
#   "session id"          : "F7 1E 6E 76 57 7B D4 98 9F 21 90 24 94 CD D3 A7 E1 83 CE BA DF 5B 07 21 5E 7B 77 A9 9E DE 90 52",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 39 B8 AD A0 C3 94 05 32   BD A5 EF 33 F6 C2 9B 2F  9......2...3.../
#             0010: AB 3D EE E9 D1 B4 B3 C7   11 73 12 84 58 53 5A 4B  .=.......s..XSZK
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.006 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "E2 87 D5 E5 BC 25 C7 B4 4A A0 C1 04 E8 DB 94 18 FE 02 EF 70 B3 F6 3E E4 FA 08 34 22 1B 2B E1 E2",
#   "session id"          : "F7 1E 6E 76 57 7B D4 98 9F 21 90 24 94 CD D3 A7 E1 83 CE BA DF 5B 07 21 5E 7B 77 A9 9E DE 90 52",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 71 DF 53 CF FB 8B CE 9E   3B 7B 20 F6 A4 3B D4 54  q.S.....;. ..;.T
#           0010: 2E 4A 6A E6 86 CF 6D A7   59 FE 72 69 6D 19 33 1B  .Jj...m.Y.rim.3.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.006 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.007 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.008 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.008 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.009 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.009 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.009 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.009 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.010 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.010 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.013 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.018 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.018 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.019 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.021 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.022 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.044 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.046 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.048 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.051 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.051 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.051 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.051 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.051 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.052 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.052 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.052 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.052 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.060 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.061 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.061 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.063 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.064 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.065 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.065 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.675 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 E1 43 B6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:18.000 UTC",
#       "not  after"         : "2024-01-15 19:17:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 75 6D 90 6E AB BD 39   2B 92 CB 4D 03 0B 7A 73  .um.n..9+..M..zs
#           0010: CE 0A 0C F6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.675 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.780 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.783 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 52 80 A0 E8 F4 A7 B7 A7   EF E9 99 7C F3 69 8A 86  R............i..
#     0010: 41 BA 60 8D 68 12 69 A2   94 30 6A 9D C5 50 E9 57  A.`.h.i..0j..P.W
#     0020: 99 97 41 4B BE 79 5D C8   20 AF EA E1 CC CA 7C 6F  ..AK.y]. ......o
#     0030: 58 37 D7 F9 0E D7 7D 5D   4C 7E 88 42 C6 BC E1 B4  X7.....]L..B....
#     0040: 28 CE 86 68 D3 51 9E 41   AF 19 40 FC E7 67 1B FC  (..h.Q.A..@..g..
#     0050: FC FD 44 D5 4A D8 A4 CE   82 AE 0D FC 97 8E 7F E0  ..D.J...........
#     0060: 02 57 8E 59 E1 D0 EC 2F   3F 99 FF 39 61 3B 72 C9  .W.Y.../?..9a;r.
#     0070: D2 22 78 79 88 ED 96 48   C7 E2 E6 75 F3 7B 0B F1  ."xy...H...u....
#     0080: C4 F2 97 8B E9 7F A8 A9   A3 C9 D1 36 C7 1E D3 02  ...........6....
#     0090: 40 8A 9C 24 A7 56 AF 2E   FF C2 D6 50 AC D5 29 5D  @..$.V.....P..)]
#     00A0: 66 79 16 B5 CE 0D D0 2B   BE 7C CA D4 68 34 B5 8B  fy.....+....h4..
#     00B0: 3A 89 54 14 A1 7D 11 7D   AB C4 57 E1 B4 81 B4 8F  :.T.......W.....
#     00C0: 63 86 9C 17 7A 91 DD EB   2B 57 D5 27 84 4A 32 D1  c...z...+W.'.J2.
#     00D0: 7D 60 86 1F 96 86 34 D5   EA A0 7A C8 37 87 86 4B  .`....4...z.7..K
#     00E0: 74 BD DC 8F 36 DD FB BF   03 84 49 05 2F E2 F4 F1  t...6.....I./...
#     00F0: 0D 76 5E E7 DC AC CE E5   66 09 00 53 93 48 DC 8A  .v^.....f..S.H..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.784 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 6A AF 10 04 AA 4A 7D 75   E0 EE D8 0C 22 F8 34 3A  j....J.u....".4:
#     0010: 36 BA BE 2F 38 DB B6 9D   4E 0A E0 ED 62 69 54 9E  6../8...N...biT.
#     0020: A8 53 28 06 EF 5C 52 45   E4 50 C3 B7 FB 69 60 C1  .S(..\RE.P...i`.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.798 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:38.799 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.800 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:38.800 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.800 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:38.801 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:38.801 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.801 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.803 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 66 58 4B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:22.000 UTC",
#       "not  after"         : "2024-01-15 19:17:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 27 5B BC 01 C4 8D 92   E6 7D 03 45 72 29 86 CC  .'[........Er)..
#           0010: 38 4D 54 65                                        8MTe
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 31 DF 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:15.000 UTC",
#       "not  after"         : "2024-01-15 19:17:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#           0010: B7 5E 82 7D                                        .^..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.874 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3C 16 55 0F 9A 3B C2 FD   9B CA C1 16 3E 7B 03 A0  <.U..;......>...
#     0010: F3 55 50 81 2C EE BB 5C   F0 0F 0F 9A 7F A6 8D 9C  .UP.,..\........
#     0020: 85 BC B5 BE E9 B1 91 39   E5 D7 BC FC 56 BC 7C 29  .......9....V..)
#     0030: B9 E1 80 F3 F7 19 39 37   22 47 4F 5E F0 B4 DA 4A  ......97"GO^...J
#     0040: AC 84 84 9A 80 F0 22 D1   BA D0 1A 53 96 07 BB 0A  ......"....S....
#     0050: F6 CE CB DC E6 30 0E 01   91 65 D2 C6 8D 27 A0 B2  .....0...e...'..
#     0060: D5 82 64 63 D3 8E E5 AD   50 20 71 2A 88 E1 C0 75  ..dc....P q*...u
#     0070: 7C 9A A5 11 0E F4 07 5B   FF 9C A1 00 A4 0B F9 2D  .......[.......-
#     0080: D6 EE C0 08 31 FB 60 50   92 C8 52 F0 A4 BE 85 6C  ....1.`P..R....l
#     0090: D5 ED 4D 2F 21 5C 34 E6   CA 61 1A C6 23 1F D6 40  ..M/!\4..a..#..@
#     00A0: 14 EF 0C 82 3B DA BF 17   79 87 C6 0A 53 D2 1C 62  ....;...y...S..b
#     00B0: D4 2F 00 10 84 36 32 38   52 59 19 05 AB 7D 30 ED  ./...628RY....0.
#     00C0: 45 90 4D 43 76 63 3C 4C   7B 0C 3B 7E 60 6E 71 19  E.MCvc<L..;.`nq.
#     00D0: 42 5F 15 5D 16 EB A8 1A   E0 F2 C3 F4 C3 CA CF 47  B_.]...........G
#     00E0: 04 78 56 B2 D2 FD C3 AF   ED 09 44 8D E5 BC 3C 06  .xV.......D...<.
#     00F0: 21 5D C2 69 C5 F5 13 0F   3B 3C 43 C9 D0 49 19 F2  !].i....;<C..I..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.876 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: A1 4F 82 5E 12 72 B5 1F   74 37 DE 10 6B 0B F3 ED  .O.^.r..t7..k...
#     0010: DC 2B 11 B3 8E 27 36 07   D2 79 AF 19 FB DF 51 CF  .+...'6..y....Q.
#     0020: E9 0A DA B5 0B 18 C0 A6   F2 27 8D 90 BD D1 14 8F  .........'......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:38.881 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:38.986 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:38.986 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:38.986 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:38.986 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:39.018 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1E FA 0D DE 01 08 A2 56 84 72 41 8A 83 33 50 AD 62 8E D8 AA CC 4F D7 C6 69 4F C0 07 36 EE FB FB",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 19:17:39.411 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 19:17:39.412 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-17 19:17:41.344; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-17 19:17:41.349; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-17 19:17:41.759; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 19:17:41.761; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-17 19:17:41.761; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5241cf67(ca,h=[localhost],a=[],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-fUth4V/test/75/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:41.799 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "7C 66 58 4B",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:22.000 UTC",
#     "not  after"         : "2024-01-15 19:17:22.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 0A 27 5B BC 01 C4 8D 92   E6 7D 03 45 72 29 86 CC  .'[........Er)..
#         0010: 38 4D 54 65                                        8MTe
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:41.803 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "28 71 E4 41",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:13.000 UTC",
#     "not  after"         : "2024-01-15 19:17:13.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:41.816 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:41.987 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:41.987 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:41.989 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:41.989 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:41.994 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:42.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:42.008 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:42.008 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:42.010 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "7D 87 22 20 64 4B 33 BB 1F E2 E5 6F 7B 5B 33 1A 34 24 D8 A7 93 43 51 29 E8 55 CA 87 ED E9 22 A1",
#   "session id"          : "D4 02 8F 15 5B 5C 9E 33 11 F4 19 7B B5 69 01 DE 0B 0A CB 90 D1 F6 AB 60 71 C3 85 C9 80 0D 93 CE",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 50 AE B4 F1 B9 60 22 33   3F 84 39 FF 33 65 71 9F  P....`"3?.9.3eq.
#             0010: 37 A5 FF DB 91 74 19 95   D2 4C A1 B8 CC 72 F5 3D  7....t...L...r.=
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.253 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "47 E1 0B 8A 83 C1 64 65 2D D5 E3 29 5C 68 FC C7 FE 54 F0 3B 8C 72 7D 57 54 6D EF A3 EA 0F 56 09",
#   "session id"          : "D4 02 8F 15 5B 5C 9E 33 11 F4 19 7B B5 69 01 DE 0B 0A CB 90 D1 F6 AB 60 71 C3 85 C9 80 0D 93 CE",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 13 CF CD C2 7D 78 A3 1A   FA 7C A6 04 BF 9B FB 32  .....x.........2
#           0010: 48 22 1D DE 8F E5 04 70   29 09 9C EF D6 96 F5 12  H".....p).......
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.253 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.253 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.254 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.255 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.258 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.264 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.265 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.266 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.267 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.267 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.268 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.287 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.289 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.291 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.300 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.301 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.301 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.303 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.304 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.304 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.305 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.305 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.312 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.313 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.313 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.316 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.322 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.322 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.323 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.333 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "77 E1 43 B6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:18.000 UTC",
#       "not  after"         : "2024-01-15 19:17:18.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D8 75 6D 90 6E AB BD 39   2B 92 CB 4D 03 0B 7A 73  .um.n..9+..M..zs
#           0010: CE 0A 0C F6                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.333 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.399 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "4B 31 DF 4C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-17 19:17:15.000 UTC",
#     "not  after"         : "2024-01-15 19:17:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#         0010: B7 5E 82 7D                                        .^..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#         0010: 4B 2C 70 CC                                        K,p.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.402 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 31 23 20 C3 46 19 7A BA   92 C4 4A 18 78 70 22 56  1# .F.z...J.xp"V
#     0010: BF 10 1A 11 90 2E B3 D5   99 C1 79 4B E8 55 C0 68  ..........yK.U.h
#     0020: 0D 6B 14 22 1C 4D A8 EB   11 48 27 84 A0 DD 5A A4  .k.".M...H'...Z.
#     0030: 12 2F BA 38 BF F3 54 4F   08 63 3D 26 36 54 55 C6  ./.8..TO.c=&6TU.
#     0040: A7 E6 2E 4D 7B 1E 7B BD   92 69 A5 A2 1F 3B 18 67  ...M.....i...;.g
#     0050: C4 C7 F6 5D EE BF C6 FB   CC 32 34 C7 A1 8C 67 C6  ...].....24...g.
#     0060: D5 A8 87 9A 0D CE 9A BE   C3 72 EA F0 86 4F A2 1D  .........r...O..
#     0070: 35 63 BB 05 7E C2 FB DD   6B 1A 66 28 B1 0C 78 82  5c......k.f(..x.
#     0080: 7A 85 72 1F 1C BD 80 3B   16 46 23 1E 8A B5 29 B1  z.r....;.F#...).
#     0090: B3 79 BF A8 C0 93 D8 F1   82 72 67 B0 1C 09 7F 53  .y.......rg....S
#     00A0: 27 7B F5 C6 CD BE 66 7D   7B 67 46 B1 5A 70 90 A3  '.....f..gF.Zp..
#     00B0: AA 6C 59 64 41 ED 82 6A   E9 EB 1B A6 56 D5 48 05  .lYdA..j....V.H.
#     00C0: 34 75 DB 04 19 9E 90 CC   38 19 FF 2B D9 74 64 C6  4u......8..+.td.
#     00D0: F2 FB F9 C6 6E 77 6D A8   D3 B1 65 DE 34 EA 37 BE  ....nwm...e.4.7.
#     00E0: 03 9C A9 B9 97 8E 71 F0   FA 75 DB 9E 37 90 F6 71  ......q..u..7..q
#     00F0: F6 7F BD 6B F9 33 79 5E   07 24 D1 30 C8 E7 8B 30  ...k.3y^.$.0...0
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.403 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 20 21 32 2E 1A E5 56 79   FB 90 B7 06 76 36 DB 50   !2...Vy....v6.P
#     0010: C5 16 3B 7D E2 9F F5 64   A7 E4 DB 43 9E EB 34 0B  ..;....d...C..4.
#     0020: 6C 93 8A 7E 68 EC 00 C2   57 8E EB 18 95 CB 0A E5  l...h...W.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.405 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:17:42.406 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.407 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.409 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "7C 66 58 4B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:22.000 UTC",
#       "not  after"         : "2024-01-15 19:17:22.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 0A 27 5B BC 01 C4 8D 92   E6 7D 03 45 72 29 86 CC  .'[........Er)..
#           0010: 38 4D 54 65                                        8MTe
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 31 DF 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:15.000 UTC",
#       "not  after"         : "2024-01-15 19:17:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#           0010: B7 5E 82 7D                                        .^..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.431 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1D 93 F8 EA 57 A2 1F FB   A7 B8 99 97 AD 13 84 1E  ....W...........
#     0010: 00 95 AC 27 B1 87 85 67   0F E5 78 F8 B8 B9 7A 2E  ...'...g..x...z.
#     0020: C3 48 DA 46 7E 86 D6 CD   DE 21 C4 E4 7D 94 30 9F  .H.F.....!....0.
#     0030: BD 59 98 B0 A1 DD E8 73   4B 08 1A 10 3B 81 38 78  .Y.....sK...;.8x
#     0040: C5 5A 8B 41 1E 70 04 A3   48 7C A5 14 61 72 D4 CA  .Z.A.p..H...ar..
#     0050: 90 ED 82 55 5F 27 47 39   9E DF DD 4D 63 28 DE 93  ...U_'G9...Mc(..
#     0060: 4F 67 67 08 79 88 50 86   CB 66 5F 37 29 8A AF A0  Ogg.y.P..f_7)...
#     0070: 56 2F 57 DE DC 74 88 0E   56 91 A9 AC 23 7A E8 3A  V/W..t..V...#z.:
#     0080: B4 FE 50 BB 9A FE 49 D7   FE 3A 52 E6 73 05 BC 81  ..P...I..:R.s...
#     0090: 87 7C 84 AC 7D 18 68 E8   D9 B5 99 F3 5F E5 F7 84  ......h....._...
#     00A0: 3E 46 46 10 28 40 2D 2B   A3 9B 1C 8D 44 B5 34 6A  >FF.(@-+....D.4j
#     00B0: D1 DA AD 46 82 E7 D6 64   FC 8A FA 08 D6 06 9C E2  ...F...d........
#     00C0: FD B0 7A 8C 90 65 ED 5B   F5 25 C9 8E 93 82 D3 62  ..z..e.[.%.....b
#     00D0: 66 18 66 49 C3 58 56 58   F4 DD D9 A2 9D 1B 87 1E  f.fI.XVX........
#     00E0: FF 2B C0 0E FA D9 4B 59   52 6F A9 E3 5F B7 29 26  .+....KYRo.._.)&
#     00F0: BF D8 E3 81 A3 59 94 EE   86 A5 8B D3 45 A1 0A 87  .....Y......E...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.432 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B1 8D 9B C3 7E EF E9 9C   A6 09 87 5F C9 3C 19 BC  ..........._.<..
#     0010: FE 42 44 38 01 4D 37 E0   CC 7B AB 4B DB 55 40 34  .BD8.M7....K.U@4
#     0020: AF DB EC C3 F6 37 51 2B   33 A1 AD 39 30 F7 3F EE  .....7Q+3..90.?.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.433 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:42.492 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "E6 EA E4 B5 56 75 AD 3D 6B 2E 58 D5 37 D9 89 86 FD 4C F1 B0 D5 9E 4F B1 81 9B 79 FD C3 DC 71 9C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-17 19:17:42.826 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-17 19:17:42.835 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|ALL|0E|h2sc-1-thread-2|2023-10-17 19:17:42.866 UTC|SSLEngineImpl.java:724|Closing inbound of SSLEngine
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:42.868 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:42.868 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:42.868 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:17:42.868 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ERROR|0E|h2sc-1-thread-2|2023-10-17 19:17:42.870 UTC|TransportContext.java:345|Fatal (INTERNAL_ERROR): closing inbound before receiving peer's close_notify (
# "throwable" : {
#   javax.net.ssl.SSLException: closing inbound before receiving peer's close_notify
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:133)
#   	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:340)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
#   	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:287)
#   	at java.base/sun.security.ssl.SSLEngineImpl.closeInbound(SSLEngineImpl.java:733)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.closeInbound(SslConnection.java:985)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:769)
#   	at org.eclipse.jetty.http2.HTTP2Connection.fill(HTTP2Connection.java:164)
#   	at org.eclipse.jetty.http2.HTTP2Connection$HTTP2Producer.produce(HTTP2Connection.java:368)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produceTask(AdaptiveExecutionStrategy.java:455)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:248)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.eclipse.jetty.http2.HTTP2Connection.produce(HTTP2Connection.java:208)
#   	at org.eclipse.jetty.http2.HTTP2Connection.onFillable(HTTP2Connection.java:155)
#   	at org.eclipse.jetty.http2.HTTP2Connection$FillableCallback.succeeded(HTTP2Connection.java:450)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.eclipse.jetty.util.thread.Invocable.invokeNonBlocking(Invocable.java:151)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.invokeAsNonBlocking(AdaptiveExecutionStrategy.java:438)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.consumeTask(AdaptiveExecutionStrategy.java:380)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.tryProduce(AdaptiveExecutionStrategy.java:277)
#   	at org.eclipse.jetty.util.thread.strategy.AdaptiveExecutionStrategy.produce(AdaptiveExecutionStrategy.java:193)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)}
#
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-17 19:17:55.894; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:56.336 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "4B 31 DF 4C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:15.000 UTC",
#       "not  after"         : "2024-01-15 19:17:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#           0010: B7 5E 82 7D                                        .^..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 5A 92 01 50 BC ED 36 70   5F 9B 93 EB B5 5F E9 62  Z..P..6p_...._.b
#           0010: 4B 2C 70 CC                                        K,p.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "28 71 E4 41",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-17 19:17:13.000 UTC",
#       "not  after"         : "2024-01-15 19:17:13.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 12 4F 1E 3E 00 3F 85 B0   B2 65 78 C6 03 3A 82 86  .O.>.?...ex..:..
#           0010: B7 5E 82 7D                                        .^..
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-17 19:17:56.348 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:56.504 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.504 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:56.506 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-17 19:17:56.506 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.510 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.521 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.521 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.522 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-17 19:17:56.524 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2C F7 40 B8 54 24 6A 58 F5 EE D3 9D 67 A7 2A 7D AE 3C 69 AF 07 6D BA C1 24 12 E7 2C DD 6E 34 2B",
#     "session id"          : "9B E7 06 31 04 96 5F 79 19 27 C3 43 B5 F1 B3 D6 40 50 86 5F 4B C8 3B CA D7 03 07 68 09 48 83 CD",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: CD 7D EB CD CE DF 45 DE   58 54 B8 55 D1 95 9E A5  ......E.XT.U....
#               0010: D3 C1 A5 A9 AB D1 B2 49   05 61 90 B8 0F 5D FB 43  .......I.a...].C
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.540 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "E2 41 0D 19 C0 ED AA 15 AA 6E FF 50 53 D4 6A 87 FB D6 AD 78 DA D8 D7 37 6E FC 29 E8 8A E5 0B AC",
#     "session id"          : "9B E7 06 31 04 96 5F 79 19 27 C3 43 B5 F1 B3 D6 40 50 86 5F 4B C8 3B CA D7 03 07 68 09 48 83 CD",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 5E 39 39 67 D5 95 C5 17   4B ED 69 61 F4 40 14 98  ^99g....K.ia.@..
#             0010: D3 8E 28 D9 54 BB CA EF   A8 B2 16 38 1E 77 5A 72  ..(.T......8.wZr
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.540 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.540 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.540 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.541 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-17 19:17:56.541 UT

[...truncated too long message...]

.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
#   	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
#   	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
#   	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
#   	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
#   	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
#   	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
#   	at java.base/java.lang.Thread.run(Thread.java:829)
#   Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
#   	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
#   	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
#   	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
#   	... 28 more}
#
# )
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-17 19:19:10.254 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:19:10.283 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:19:10.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:19:10.283 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-17 19:19:10.283 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: IOException occurred when talking to server at: https://localhost:35156/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:551)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:582)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:464)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:421)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:141)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:161)
# Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)
# 	at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)
# 	at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)
# 	at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1074)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 77 SOLR-11740 check 'solr stop' connection in 14602ms
ok 78 stop command for single port in 17201ms
ok 79 status detects locally running solr in 9517ms
ok 80 status shell script ignores passed in -solrUrl cli parameter from user in 7731ms
ok 81 status help flag outputs message highlighting not to use solrUrl. in 1132ms
ok 82 listing out files in 3119ms
ok 83 copying files around in 6691ms
ok 84 upconfig in 2636ms
ok 85 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1251ms
ok 86 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1246ms
ok 87 Cleanup in 2127ms

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 36s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ikhyj4rp4aczy

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8206 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8206/

All tests passed

Build Log:
[...truncated 1518 lines...]
BUILD FAILED in 1h 3m
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/kfztdqul7szpa

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8205 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8205/

All tests passed

Build Log:
[...truncated 1447 lines...]
BUILD FAILED in 1h 8m 35s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/i7jrhrtdgpvw4

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8204 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8204/

All tests passed

Build Log:
[...truncated 1433 lines...]
BUILD FAILED in 1h 2m 36s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/2u6womqfi2z7y

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8203 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8203/

All tests passed

Build Log:
[...truncated 1442 lines...]
BUILD FAILED in 1h 5m 16s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/hb5jqwpkefxgk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8202 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8202/

All tests passed

Build Log:
[...truncated 1480 lines...]
BUILD FAILED in 1h 2m 57s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/uuf3gpdn2nen2

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8201 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8201/

All tests passed

Build Log:
[...truncated 1479 lines...]
BUILD FAILED in 1h 4m 11s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/gx64ftviidvzi

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8200 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8200/

All tests passed

Build Log:
[...truncated 1263 lines...]
# ERROR: Error from server at http://localhost:41087/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16327ms
ok 57 Check help command in 4550ms
ok 58 basic post with a type specified in 6024ms
ok 59 basic post WITHOUT a type specified in 11748ms
ok 60 crawling a directory in 4477ms
ok 61 crawling a web site in 4699ms
ok 62 commit and optimize and delete in 4020ms
ok 63 args mode in 6529ms
ok 64 stdin mode in 3446ms
ok 65 post solr log into solr via script in 10002ms
ok 66 post solr log into solr via cli in 7058ms
ok 67 allowPaths - backup in 16927ms
ok 68 start solr with ssl in 18645ms
not ok 69 use different hostname when not checking peer-name in 21066ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 41087 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41087 (pid=1953228). Happy searching!
#
#     INFO  - 2023-10-16 21:47:56.392; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:47:56.397; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 21:47:56.948; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 21:47:57.073; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 21:47:57.075; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-16 21:48:07.287; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 21:48:07.291; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-16 21:48:07.687; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6326d182(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4fe89c24[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:41087/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-16 21:48:09.127; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:48:09.131; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 11093ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 41087 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41087 (pid=1954035). Happy searching!
#
#     INFO  - 2023-10-16 21:48:17.789; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:48:17.794; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-16 21:48:20.471; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:48:20.476; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 19390ms
not ok 72 start solr with mTLS needed in 51939ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-2q7KJJ/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41087 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41087 (pid=1955779). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41088 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41088 (pid=1955904). Happy searching!
#
#     INFO  - 2023-10-16 21:49:06.317; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:49:06.331; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 21:49:07.302; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:49:07.304; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:49:07.306; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:07.349 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 43 C8 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:52.000 UTC",
#     "not  after"         : "2024-01-14 21:48:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 C1 C7 59 ED 93 2A 4A   FD FE 67 E4 25 84 F9 A8  ...Y..*J..g.%...
#         0010: A5 17 51 C1                                        ..Q.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:07.353 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 7B 19 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:43.000 UTC",
#     "not  after"         : "2024-01-14 21:48:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:07.365 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:49:07.668 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:49:07.669 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:49:07.669 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 21:49:07.669 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:07.759 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.761 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:07.766 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:07.768 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.786 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.815 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.815 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:07.817 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "31 5E 0D 09 60 03 31 C5 9B 5A 70 1D 95 22 BE 54 70 AD 39 6F F9 C3 A0 86 7D C6 44 26 1C 3F 16 AC",
#   "session id"          : "F9 87 56 86 56 FB F2 FF 41 0E A0 39 97 36 A0 F8 59 32 9A 2C 8E 7B EB 07 10 86 FE DC C8 2F 2C 8C",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: E3 F9 69 4A BE 69 FE 95   AD 4E 82 B1 38 B4 D7 57  ..iJ.i...N..8..W
#             0010: FC BE 79 BE 5F B0 D9 02   2A 3C 4E 29 89 EB F0 6B  ..y._...*<N)...k
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.504 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F6 51 6A 3D 1E D0 07 85 58 DF 3D 71 F7 16 65 86 D6 A5 15 8E D1 44 53 77 AD F3 B1 AE B9 BC 2A EE",
#   "session id"          : "F9 87 56 86 56 FB F2 FF 41 0E A0 39 97 36 A0 F8 59 32 9A 2C 8E 7B EB 07 10 86 FE DC C8 2F 2C 8C",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 95 6B 2E 61 5B ED 77 B2   C7 D0 B7 0D 93 25 0F 66  .k.a[.w......%.f
#           0010: 31 DA 9B 0F 13 BC B3 E4   C2 ED 6D CA FE 3E A9 7C  1.........m..>..
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.504 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.505 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.508 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.509 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.509 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.509 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.509 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.513 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.513 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.515 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.516 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.516 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.524 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.546 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.547 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.564 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.565 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.567 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.567 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.570 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.585 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.586 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.586 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.590 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 3A 49 5A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:48.000 UTC",
#       "not  after"         : "2024-01-14 21:48:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A A6 1B D2 8A 67 29 A6   90 65 1C 5B E5 D0 DB 5F  :....g)..e.[..._
#           0010: E0 8D 1C 6B                                        ...k
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.591 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.642 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.647 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 22 17 C2 F9 68 11 54 69   E4 B3 C1 50 E3 86 52 D0  "...h.Ti...P..R.
#     0010: EA 62 84 D9 94 FF 52 8C   C6 BA 7F E0 47 C6 08 16  .b....R.....G...
#     0020: 98 05 7F 07 3F 93 83 10   AD 3B 3B 5F CB D5 BD 52  ....?....;;_...R
#     0030: E5 43 89 E4 E5 20 EB 64   5B 8E 87 20 00 AC 77 0D  .C... .d[.. ..w.
#     0040: 1B DE 32 FC 5F E9 97 9D   58 22 0B 5D B2 26 51 1F  ..2._...X".].&Q.
#     0050: 7F 32 BC C7 38 1B AF 1B   4B 3D 79 EF 6E 7F 8C D1  .2..8...K=y.n...
#     0060: 2D 97 F4 F6 8E 74 ED FF   32 23 49 11 F8 3B B3 C9  -....t..2#I..;..
#     0070: C3 AE 97 7B 11 44 90 FD   D2 4E 47 12 BC 37 F4 1B  .....D...NG..7..
#     0080: 0F 94 65 08 F5 11 F9 41   0C 7D 39 88 42 2B 9D 4C  ..e....A..9.B+.L
#     0090: 2C 91 8B 3B F4 4B 96 4C   9B BF 7B BA CB 1F A8 7C  ,..;.K.L........
#     00A0: FD 85 7E 1D 65 94 66 CB   4C 6B D2 85 85 E8 C4 72  ....e.f.Lk.....r
#     00B0: A9 49 2D 74 B9 98 30 82   73 96 4B 28 81 E4 DC DA  .I-t..0.s.K(....
#     00C0: 06 63 6B 6B 3C D0 4A AF   88 85 BE 8D 4C D3 B4 61  .ckk<.J.....L..a
#     00D0: CD 52 30 39 98 ED C1 C2   46 B7 0D 8F 23 73 B1 29  .R09....F...#s.)
#     00E0: 53 24 93 A2 F4 EC F3 24   EE 92 30 0B CB EA D7 96  S$.....$..0.....
#     00F0: 6F 4A 02 2B 37 E2 58 95   13 C5 5F ED 51 E8 BB 51  oJ.+7.X..._.Q..Q
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.650 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1F 6F 66 99 1B 21 C5 7B   83 CC BD 42 DA 67 B3 39  .of..!.....B.g.9
#     0010: DF 23 E8 0A EC BB 2C 6E   CB ED B7 65 A7 29 9A B6  .#....,n...e.)..
#     0020: BD 37 FD 10 48 23 8B 69   5F C7 82 A5 FA 87 25 21  .7..H#.i_.....%!
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.654 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:08.655 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.655 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:08.655 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.656 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:08.656 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:08.656 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.656 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.667 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 43 C8 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:52.000 UTC",
#       "not  after"         : "2024-01-14 21:48:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 C1 C7 59 ED 93 2A 4A   FD FE 67 E4 25 84 F9 A8  ...Y..*J..g.%...
#           0010: A5 17 51 C1                                        ..Q.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 50 6A DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:45.000 UTC",
#       "not  after"         : "2024-01-14 21:48:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#           0010: 74 EB 97 F3                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.724 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 57 F2 6B 10 6F DA CE 35   18 92 3A 32 7A 7B 79 4A  W.k.o..5..:2z.yJ
#     0010: 19 34 10 E9 31 1A 60 DD   B4 1C E0 62 02 40 DB C8  .4..1.`....b.@..
#     0020: A1 F2 4B C2 F3 94 08 BB   AF 7A 2A 1E 79 B9 B1 CB  ..K......z*.y...
#     0030: 59 E3 0B 6D 14 6E 52 CC   9E EF DD 8F 08 EF F6 D7  Y..m.nR.........
#     0040: 0C D5 CE 46 0E 5D 10 F0   D0 ED 49 70 22 A0 E4 8A  ...F.]....Ip"...
#     0050: D6 A8 BD D1 61 4E C1 A8   D1 A7 F9 1C F4 9E 07 AE  ....aN..........
#     0060: D9 E7 8A 5F D7 75 6A 4B   D5 04 F6 1F 4E 61 3C 8B  ..._.ujK....Na<.
#     0070: 09 7F CA F7 19 3D E1 31   EB 98 C7 F5 05 BF B2 5F  .....=.1......._
#     0080: C3 CB 8C 2E 2A C2 8E 4D   DD 64 26 C8 70 41 57 C2  ....*..M.d&.pAW.
#     0090: 2F F9 E4 BE 04 9E 5A F4   A7 B3 A3 08 B8 9D 55 16  /.....Z.......U.
#     00A0: BF 7D 7D AE 0F 17 51 45   A0 06 81 F8 97 37 08 B0  ......QE.....7..
#     00B0: EF D6 54 0C D7 8F 44 E8   1A 43 6C E4 66 40 46 0A  ..T...D..Cl.f@F.
#     00C0: 7C 18 1C 8A F8 40 52 9E   73 6B 87 6A 7E 5F 55 4D  .....@R.sk.j._UM
#     00D0: B2 EA F9 5E 08 B3 64 49   F9 C3 B2 7D 5B 97 EC 4F  ...^..dI....[..O
#     00E0: 88 4D 4F 60 56 DF 91 3D   40 D1 0E 94 35 35 EB 3A  .MO`V..=@...55.:
#     00F0: 29 D4 B1 41 0B 36 AE D0   8E 7B F2 7D EE B3 20 5B  )..A.6........ [
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.728 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B5 1D 00 25 77 64 C5 A6   62 B2 2C 99 AD 71 FD D2  ...%wd..b.,..q..
#     0010: F3 6D 16 84 73 1D 52 72   5E B4 72 48 23 ED 46 90  .m..s.Rr^.rH#.F.
#     0020: 8B 7C DC 1C D9 1C 41 01   23 72 F1 7B 85 07 6D 1F  ......A.#r....m.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.728 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:08.852 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "84 36 75 E8 3D 39 6C 1E 42 54 CF 79 56 9F A6 DB 5C 00 2F 1B 66 3B 11 94 14 05 ED 90 B6 10 5D C2",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 21:49:09.634 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 21:49:09.636 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 21:49:10.869; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 21:49:10.874; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 21:49:11.276; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:49:11.278; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 21:49:11.279; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-2q7KJJ/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:11.317 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "36 43 C8 1C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:52.000 UTC",
#     "not  after"         : "2024-01-14 21:48:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 11 C1 C7 59 ED 93 2A 4A   FD FE 67 E4 25 84 F9 A8  ...Y..*J..g.%...
#         0010: A5 17 51 C1                                        ..Q.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:11.321 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2D 7B 19 46",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:43.000 UTC",
#     "not  after"         : "2024-01-14 21:48:43.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:11.334 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:11.529 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.530 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:11.531 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:11.531 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.537 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.657 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.657 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.658 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:11.660 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "DD 78 F5 90 EB 05 4C 13 D9 86 58 B3 AD 66 C8 23 1C 7A AE 17 C8 13 4B 4D 89 5D 01 0E EF 26 09 40",
#   "session id"          : "20 DA 50 05 62 10 37 27 73 96 39 0C BC 40 77 4E 96 BB D0 78 E7 26 0F 62 D1 5D 06 5F F7 F6 02 6A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: DB 6F 4C B8 D3 B3 87 1F   10 39 01 E5 E2 B8 DA 97  .oL......9......
#             0010: 72 C5 BA BD 1F 13 E7 4D   23 65 7F C5 13 81 A2 17  r......M#e......
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.768 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "19 61 01 0B AE 3B 40 34 14 95 9A 03 54 02 73 7D 1A FA 4E 19 76 2B F8 7C BB EA 78 5C 97 9D 6F 68",
#   "session id"          : "20 DA 50 05 62 10 37 27 73 96 39 0C BC 40 77 4E 96 BB D0 78 E7 26 0F 62 D1 5D 06 5F F7 F6 02 6A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 43 75 B9 70 89 BD B7 54   C6 5D 42 6B C4 63 2F 33  Cu.p...T.]Bk.c/3
#           0010: F4 8A 1A 30 76 5F 3E 40   27 04 98 85 BF 41 64 2B  ...0v_>@'....Ad+
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.768 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.769 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.770 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.771 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.772 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.772 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.780 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.785 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.785 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.785 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.786 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.801 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.803 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.804 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.811 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.812 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.814 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.814 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.814 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.814 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.815 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.816 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.816 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.818 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "62 3A 49 5A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:48.000 UTC",
#       "not  after"         : "2024-01-14 21:48:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3A A6 1B D2 8A 67 29 A6   90 65 1C 5B E5 D0 DB 5F  :....g)..e.[..._
#           0010: E0 8D 1C 6B                                        ...k
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.818 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.874 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "11 50 6A DA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 21:48:45.000 UTC",
#     "not  after"         : "2024-01-14 21:48:45.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#         0010: 74 EB 97 F3                                        t...
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#         0010: 40 37 E5 57                                        @7.W
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.878 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F 12 6B C6 9E 8F 48 3B   BC ED BF 18 27 D2 AD 56  ..k...H;....'..V
#     0010: 93 9D 78 33 15 67 48 FF   01 31 F0 CE E2 59 AB A7  ..x3.gH..1...Y..
#     0020: 93 35 79 94 AD 55 C3 32   E7 93 BC 04 0A 59 4E 16  .5y..U.2.....YN.
#     0030: 74 65 6B 37 60 EF C7 B0   8C E6 CF 27 20 92 D8 AF  tek7`......' ...
#     0040: 81 B6 17 5E 77 E2 80 02   D0 F8 7E 79 72 A1 07 C1  ...^w......yr...
#     0050: 04 A6 CE 51 02 3D 5B 07   CF C4 06 55 81 97 6F 61  ...Q.=[....U..oa
#     0060: 8E D9 ED 89 F9 70 B5 BF   DD C6 0B 1E 41 32 4A 9A  .....p......A2J.
#     0070: 84 62 38 29 B3 31 84 F4   2E 2E 5B D2 4A 41 72 71  .b8).1....[.JArq
#     0080: A2 47 9F B8 A3 60 F0 7E   E3 C4 6A 74 59 7D 32 24  .G...`....jtY.2$
#     0090: 83 82 26 C9 58 E2 81 88   57 63 0F 1B F6 04 92 49  ..&.X...Wc.....I
#     00A0: 5A 85 E5 2F 64 0B F9 EA   0B FC 03 2C B4 08 AB D7  Z../d......,....
#     00B0: 7E 83 29 13 97 59 43 45   2D 06 6D 66 5F C7 19 58  ..)..YCE-.mf_..X
#     00C0: 4A BD AB 14 E1 48 7F B8   D7 75 4F 97 D8 E2 90 FD  J....H...uO.....
#     00D0: F0 1A 26 B5 FB E0 61 F5   06 98 C3 63 F3 DF 09 1D  ..&...a....c....
#     00E0: FF DC 82 96 F2 E8 19 B6   D5 6C 83 B8 B0 8A A2 D1  .........l......
#     00F0: C9 4E 39 19 3E B0 01 C2   DC CD 4C 35 E9 89 B3 C4  .N9.>.....L5....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.879 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 52 75 A3 A7 06 38 72 27   3D 8F 66 46 18 06 7D 21  Ru...8r'=.fF...!
#     0010: C1 98 41 56 97 3B B6 8F   93 F2 9F 98 25 B3 E7 0F  ..AV.;......%...
#     0020: 1D B8 4C 59 C8 B5 A3 27   C9 41 1B C7 3B 3C 59 DE  ..LY...'.A..;<Y.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.881 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 21:49:11.882 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.883 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.885 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "36 43 C8 1C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:52.000 UTC",
#       "not  after"         : "2024-01-14 21:48:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 11 C1 C7 59 ED 93 2A 4A   FD FE 67 E4 25 84 F9 A8  ...Y..*J..g.%...
#           0010: A5 17 51 C1                                        ..Q.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 50 6A DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:45.000 UTC",
#       "not  after"         : "2024-01-14 21:48:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#           0010: 74 EB 97 F3                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.908 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 75 08 E9 98 48 4C 27 CF   9D 55 B7 9E 4A 1F 1E 4D  u...HL'..U..J..M
#     0010: 84 62 47 80 42 E6 58 5F   C3 BF DA 6C 62 C4 7A 48  .bG.B.X_...lb.zH
#     0020: BA D5 AB 2E 31 0C 84 A1   35 B0 AE F8 EA 7B EC 64  ....1...5......d
#     0030: F5 F3 30 84 8B C7 6E 35   2D EA 22 7A 32 DD 2D C3  ..0...n5-."z2.-.
#     0040: 9D 14 EC AA C2 D9 F6 6C   5C CB 2A 47 72 47 81 BA  .......l\.*GrG..
#     0050: 7F 85 82 35 4E 7F F7 A5   CD D6 2E 26 9A EA D1 CF  ...5N......&....
#     0060: 35 2B 57 BA 09 74 0A FD   30 87 1F 50 DB 80 84 CC  5+W..t..0..P....
#     0070: DF 2C 6D 00 E4 64 03 31   4B 18 76 8E EA 18 4A 16  .,m..d.1K.v...J.
#     0080: 3C 73 3B 07 2A E8 A5 0E   AA A9 9B E5 54 92 DB 8E  <s;.*.......T...
#     0090: 6D 63 67 00 BA B2 AF C5   74 78 8A 19 2E 9C 6B 13  mcg.....tx....k.
#     00A0: 05 23 01 04 5C 10 EF B2   8E BF F2 E2 90 58 1C 42  .#..\........X.B
#     00B0: 8C C9 19 8D 79 75 9A 16   67 4D 3F DC A1 7C 47 60  ....yu..gM?...G`
#     00C0: EE 89 43 6A CE EE A6 AF   0A 4A 3A 8B BC 73 60 D7  ..Cj.....J:..s`.
#     00D0: 43 08 29 66 C7 B5 09 DF   17 A8 83 66 08 48 F5 7E  C.)f.......f.H..
#     00E0: C5 30 B6 2A 9A 34 F0 3D   88 15 9F FC 04 D7 01 BC  .0.*.4.=........
#     00F0: 37 D6 0F 5E 46 37 6B 4F   33 E6 BF 22 8D 74 F9 FE  7..^F7kO3..".t..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.909 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 43 62 57 C1 C8 B5 7E 79   17 6A 34 D7 37 E2 A6 FC  CbW....y.j4.7...
#     0010: F1 16 BB 93 0C D9 B1 3D   B4 9F 5B CB 49 CC F3 19  .......=..[.I...
#     0020: 0B F6 76 55 B4 CC 3F C1   67 CD 0F B3 E6 41 39 2C  ..vU..?.g....A9,
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.910 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:11.985 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "90 64 56 06 9E 29 62 95 E9 1B 18 6E 03 4C 23 CB 4F 68 74 BB 76 9A ED 02 39 37 C4 CF DA 5D 4A 1A",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 21:49:12.539 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 21:49:12.540 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-10-16 21:49:26.112; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:26.465 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2D 7B 19 46",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:43.000 UTC",
#       "not  after"         : "2024-01-14 21:48:43.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#           0010: 74 EB 97 F3                                        t...
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "11 50 6A DA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 21:48:45.000 UTC",
#       "not  after"         : "2024-01-14 21:48:45.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CD D0 01 95 8B 7B 2B E4   89 B3 49 39 E3 9B 03 BB  ......+...I9....
#           0010: 74 EB 97 F3                                        t...
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 07 97 A8 6D 70 83 99 DB   F3 13 63 5D 1E 1B 71 79  ...mp.....c]..qy
#           0010: 40 37 E5 57                                        @7.W
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 21:49:26.478 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:26.643 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.643 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:26.645 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 21:49:26.645 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.650 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.662 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.662 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.662 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 21:49:26.664 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "F8 39 80 32 BC E8 35 B0 C6 B3 EF 2E BC 2C B4 D8 FE ED 28 89 AD CB 68 59 E6 F3 1F 2D C5 A7 35 C2",
#     "session id"          : "D2 79 7B EF 8B 10 54 BB A9 42 23 EF 08 2B BC 32 F3 C1 D8 41 10 04 9F DB D0 51 3A 45 F3 77 1E 34",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: D8 46 8C ED 4D 5E C6 24   D2 BC F8 B0 3C 1E 59 4F  .F..M^.$....<.YO
#               0010: AD 7A 75 8A 58 F3 7E C1   AD 37 0E E4 E2 84 20 70  .zu.X....7.... p
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 21:49:26.681 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "21 49 B0 4C 61 FB C6 39 B7 26 20 D8 C1 B3 F3 04 47 43 89 C4 F8 5E D9 EE 05 25 F4 57 B6 C7 6F 25",
#     "session id"          : "D2 79 7B EF 8B 10 54 BB A9 42 23 EF 08 2B BC 32 F3 C1 D8 41 10 04 9F DB D0 51 3A 45 F3 77 1E 34",
#     "cipher suite"        : "TLS_AES_256

[...truncated too long message...]

C=US",
#     "not before"         : "2013-08-01 12:00:00.000 UTC",
#     "not  after"         : "2038-01-15 12:00:00.000 UTC",
#     "subject"            : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 22 54 20 18 95 E6 E3   6E E6 0F FA FA B9 12 ED  N"T ....n.......
#         0010: 06 17 8F 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 8A 5D 07 EC 55 D2 32 D5 B7 E3 B6 5F 01 EB 2D DC E4 D6 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "not before"         : "2015-10-19 07:43:30.000 UTC",
#     "not  after"         : "2035-10-19 07:43:30.000 UTC",
#     "subject"            : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 16 A9 4A 18 B5 CB CC   F5 6F 50 F3 23 5F F8 5D  ...J.....oP.#_.]
#         0010: E7 AC F0 C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 14403ms
ok 75 stop command for single port in 20715ms
not ok 76 status detects locally running solr in 1626ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 10082ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1798ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3893ms
ok 80 copying files around in 6656ms
ok 81 upconfig in 2673ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1252ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1253ms
not ok 84 Cleanup in 2704ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 31s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/6kzwlf6jiamua

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8199 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8199/

All tests passed

Build Log:
[...truncated 1260 lines...]
# ERROR: Error from server at http://localhost:45175/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16718ms
ok 57 Check help command in 4475ms
ok 58 basic post with a type specified in 5764ms
ok 59 basic post WITHOUT a type specified in 12062ms
ok 60 crawling a directory in 4570ms
ok 61 crawling a web site in 4832ms
ok 62 commit and optimize and delete in 3785ms
ok 63 args mode in 6416ms
ok 64 stdin mode in 3373ms
ok 65 post solr log into solr via script in 9977ms
ok 66 post solr log into solr via cli in 7298ms
ok 67 allowPaths - backup in 16658ms
ok 68 start solr with ssl in 18841ms
not ok 69 use different hostname when not checking peer-name in 20178ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 45175 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45175 (pid=1411336). Happy searching!
#
#     INFO  - 2023-10-16 17:36:13.035; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:36:13.040; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 17:36:13.496; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@235f4c10(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 17:36:13.587; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 17:36:13.588; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@36b0fcd5[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-16 17:36:23.471; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 17:36:23.475; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-16 17:36:23.864; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@72bd06ca(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@6175619b[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:45175/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-16 17:36:25.337; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:36:25.341; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 10686ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 45175 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45175 (pid=1412141). Happy searching!
#
#     INFO  - 2023-10-16 17:36:33.201; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:36:33.206; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-16 17:36:36.014; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:36:36.019; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 19218ms
not ok 72 start solr with mTLS needed in 52252ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-TMYkY6/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 45175 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45175 (pid=1413893). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 45176 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 45176 (pid=1414019). Happy searching!
#
#     INFO  - 2023-10-16 17:37:22.036; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:37:22.042; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 17:37:22.599; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6e16b8b5(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 17:37:22.602; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 17:37:22.603; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(ca,h=[localhost],a=[],w=[]) for Client@c7a975a[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:22.661 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 38 C3 7C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:07.000 UTC",
#     "not  after"         : "2024-01-14 17:37:07.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 95 3F 5F E8 65 06 02   82 97 C9 E1 D6 D6 28 F4  ..?_.e........(.
#         0010: F2 D9 39 F5                                        ..9.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:22.671 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 9A 1D 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:36:58.000 UTC",
#     "not  after"         : "2024-01-14 17:36:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:22.964 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:23.303 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.303 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:23.308 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:23.308 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.319 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.340 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.341 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.341 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:23.344 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A2 06 56 B0 96 9C 99 E6 EB 01 D1 5A 57 8E C3 2C 36 8D 9F 2B F6 76 A6 90 17 84 4E 0B 73 0B 9F 86",
#   "session id"          : "E0 07 2D 5F E9 7E 4E 0F 5C 43 E6 C6 E6 20 35 D8 41 C2 CA E2 E2 2D F6 FB 8B 66 2B 1E D3 BB 91 4A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: D3 DB E9 7A CC 4A 39 D2   A0 9A D1 40 90 CE 70 94  ...z.J9....@..p.
#             0010: FE 22 01 C2 6D C5 72 12   B6 EB 62 D3 4C 44 75 24  ."..m.r...b.LDu$
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.821 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "FA CC 48 DC A9 14 72 BD 8F 29 97 EB 53 BA D6 30 25 83 B5 B9 4B C3 DF 5B 08 CE 25 F0 E0 41 4F FE",
#   "session id"          : "E0 07 2D 5F E9 7E 4E 0F 5C 43 E6 C6 E6 20 35 D8 41 C2 CA E2 E2 2D F6 FB 8B 66 2B 1E D3 BB 91 4A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 67 D0 11 FB 61 D8 6B 7E   DA 90 98 92 79 89 01 6A  g...a.k.....y..j
#           0010: 84 AF 33 66 2D 5B E6 70   18 35 6A EA 06 C5 C0 0E  ..3f-[.p.5j.....
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.821 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.822 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.823 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.824 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.825 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.826 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.832 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.837 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.839 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.839 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.840 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.843 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.844 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.871 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.873 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.874 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.877 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.877 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.877 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.877 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.878 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.878 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:23.878 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:23.878 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.879 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.879 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.879 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.880 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.880 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.881 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:23.881 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.898 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B BE 59 D1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:03.000 UTC",
#       "not  after"         : "2024-01-14 17:37:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 B1 A4 1D C4 BB BF E3   5A 9A AB 84 30 7D E0 72  ........Z...0..r
#           0010: C3 4D 2B 44                                        .M+D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:23.898 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.416 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.419 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: A2 F5 C5 90 52 31 D2 5A   5D 87 20 24 B2 F7 BE 78  ....R1.Z]. $...x
#     0010: 09 D7 EE E2 84 01 EC 5B   3D 60 64 66 A4 96 1F 1D  .......[=`df....
#     0020: BF E0 F1 F1 B8 C8 9F 0B   54 D9 14 2F 80 EF 6D 4F  ........T../..mO
#     0030: 52 93 7C 9C 29 52 A4 FB   B5 04 56 0C E9 66 EA 7D  R...)R....V..f..
#     0040: 58 4D C1 A6 B3 4F 79 D4   F4 E8 C4 DE A4 9C E1 47  XM...Oy........G
#     0050: 80 A1 5E 74 E5 A4 4C 86   60 B8 91 C5 DD 74 B9 F9  ..^t..L.`....t..
#     0060: F6 4A 06 59 D9 62 BA 33   B5 56 F1 12 57 5C 24 36  .J.Y.b.3.V..W\$6
#     0070: BB D0 E8 6E 43 3A 96 9E   DC 2B 49 D7 33 D7 11 36  ...nC:...+I.3..6
#     0080: BB FE 01 C5 D0 38 46 FA   72 49 9A 61 E8 DE B0 2E  .....8F.rI.a....
#     0090: 86 A1 BF 7C 1F 72 6E 34   97 6A F9 77 D9 EF D1 F6  .....rn4.j.w....
#     00A0: 6C E7 AA 1E 20 3A 1A D4   82 E3 00 18 F5 58 75 23  l... :.......Xu#
#     00B0: BE DC 07 65 DA 26 61 2E   38 77 14 0B 50 B1 EA 7B  ...e.&a.8w..P...
#     00C0: F5 B0 59 61 1F 91 1F 0D   1B AC 9E AA BB 93 2C 98  ..Ya..........,.
#     00D0: 0E B3 B2 5D 41 9A 7B 16   02 CA 61 F4 89 87 25 8D  ...]A.....a...%.
#     00E0: 79 D2 33 59 8E 93 37 1B   E7 1A 4E 2C C8 92 6E 64  y.3Y..7...N,..nd
#     00F0: 69 94 4D 33 36 F2 AF CF   9B 02 85 3C 2C F5 F8 18  i.M36......<,...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.421 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 3A 1B 53 B4 1A 19 5D DA   9A FD 9B 13 09 B2 13 03  :.S...].........
#     0010: 19 FB 47 7A CB DC 3A 33   A5 8A 1C AC 48 BA F8 5C  ..Gz..:3....H..\
#     0020: 7C 91 1C 30 85 0B B3 A9   4D BF 64 97 E9 C1 6B E6  ...0....M.d...k.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.422 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:24.423 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:24.423 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:24.424 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:24.424 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:24.424 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:24.424 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.424 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.426 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 38 C3 7C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:07.000 UTC",
#       "not  after"         : "2024-01-14 17:37:07.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 95 3F 5F E8 65 06 02   82 97 C9 E1 D6 D6 28 F4  ..?_.e........(.
#           0010: F2 D9 39 F5                                        ..9.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 65 FF C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:01.000 UTC",
#       "not  after"         : "2024-01-14 17:37:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#           0010: 36 8F C4 5C                                        6..\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.473 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 26 3C 8C A4 17 B6 F5   82 B1 2B 4E 3A F5 33 55  .&<.......+N:.3U
#     0010: 81 9F FF B9 CE D8 4E E2   FD DC 43 75 47 26 EA 14  ......N...CuG&..
#     0020: 15 A9 9D 0E EF 1F 1B 61   E5 D1 B8 36 21 97 DC F0  .......a...6!...
#     0030: 62 AF BE 6D 31 48 0E 2E   BD 82 73 3B 94 1F 9D 07  b..m1H....s;....
#     0040: F9 D2 62 8D B7 19 17 98   5C F4 AC 71 26 FB 12 12  ..b.....\..q&...
#     0050: 1F 5F CD 74 33 93 7C 49   74 12 13 B9 17 BF E5 D2  ._.t3..It.......
#     0060: 64 B8 EB 2F 7B A4 10 85   91 60 21 B0 BB D4 C1 4E  d../.....`!....N
#     0070: E5 F4 BA 54 D0 D9 AE 48   64 49 DF F1 8A 7F B2 8B  ...T...HdI......
#     0080: E9 4D 9B 99 EB 7E 5A 4B   AB 04 9A CF BF C1 43 03  .M....ZK......C.
#     0090: 7C 94 1D 43 63 20 DF 44   9C A4 F7 4E B1 6C 70 7D  ...Cc .D...N.lp.
#     00A0: E8 ED 8C 6E F3 4E 58 0A   EB 00 55 A0 A1 5A F1 47  ...n.NX...U..Z.G
#     00B0: FF 47 0E 18 50 31 7C EC   AE 3E 9A 03 50 03 79 C0  .G..P1...>..P.y.
#     00C0: D3 3B 14 2F 17 E0 72 7E   21 A7 0A 18 4F 02 0D 7C  .;./..r.!...O...
#     00D0: B3 78 12 20 A4 3E 9F BA   7D 5D 0D CE 90 0A BF EB  .x. .>...]......
#     00E0: F7 E3 9B E8 CD 0F D4 B2   1C 96 07 14 62 0D 02 E6  ............b...
#     00F0: BA 65 B9 5F C8 23 2B 28   D4 FF C6 44 39 D8 BA 24  .e._.#+(...D9..$
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.475 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 4F 4C 0C CC 81 7A 29 4B   90 DC 3D BF 14 10 07 57  OL...z)K..=....W
#     0010: DE FF 83 E5 27 5E 04 3E   63 35 27 71 FF 1D F5 79  ....'^.>c5'q...y
#     0020: A9 A5 E9 13 52 61 0B 1C   9A D3 82 BF A0 9B DE 68  ....Ra.........h
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.475 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:24.560 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "F5 BF C7 A7 A4 EF 1E 05 00 7B 0F AF CF 28 F0 51 31 38 26 FD 0E C6 5A 6B FB F1 51 55 E2 46 DE D5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:24.611 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:24.611 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:24.612 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:24.612 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-16 17:37:25.009 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 17:37:25.010 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 17:37:26.055; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 17:37:26.060; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 17:37:26.443; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 17:37:26.445; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 17:37:26.445; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-TMYkY6/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:26.478 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "53 38 C3 7C",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:07.000 UTC",
#     "not  after"         : "2024-01-14 17:37:07.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: A6 95 3F 5F E8 65 06 02   82 97 C9 E1 D6 D6 28 F4  ..?_.e........(.
#         0010: F2 D9 39 F5                                        ..9.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:26.482 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "5C 9A 1D 91",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:36:58.000 UTC",
#     "not  after"         : "2024-01-14 17:36:58.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:26.494 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:26.614 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:26.615 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:26.615 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 17:37:26.615 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:26.689 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.689 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:26.690 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:26.691 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.695 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.708 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.708 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:26.710 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "A8 9F CF E6 B1 3E 13 08 6E E9 F9 87 62 31 32 BB 8C 8A E7 0E BF 8B BE 9C C6 EC 0D 74 2C 5C 00 14",
#   "session id"          : "6A 61 6E E6 54 91 66 F5 4F 53 2B 80 8B 72 FF 2D C3 F5 35 5B 90 0C 18 8C DB D1 76 B6 4F 53 E7 B1",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CA 14 C7 20 C5 89 92 01   D9 97 21 3E E2 BA C5 F8  ... ......!>....
#             0010: 5A 67 3B 65 A4 06 79 CF   0D 92 98 7D C1 55 8B 04  Zg;e..y......U..
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.232 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "DD 6B 57 D6 9A 3E 78 53 27 8A 0E 7C A8 8A 08 CB 01 86 1B 5A 8A BF F4 6F C1 C4 14 22 6D 75 0B F0",
#   "session id"          : "6A 61 6E E6 54 91 66 F5 4F 53 2B 80 8B 72 FF 2D C3 F5 35 5B 90 0C 18 8C DB D1 76 B6 4F 53 E7 B1",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 3C 78 10 19 B3 45 96 5B   BF B3 FC 11 DA B5 FD 0B  <x...E.[........
#           0010: CC F0 83 6B B0 D2 E8 25   08 D7 63 00 FF F7 5A 14  ...k...%..c...Z.
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.232 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.232 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.234 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.234 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.235 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.237 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.237 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.237 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.239 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.239 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.240 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.240 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.241 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.254 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.255 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.263 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.266 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.266 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.266 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.266 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.266 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.267 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.267 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.267 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.267 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.268 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.268 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.268 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.269 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.269 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.270 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.270 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.278 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "6B BE 59 D1",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:03.000 UTC",
#       "not  after"         : "2024-01-14 17:37:03.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: F6 B1 A4 1D C4 BB BF E3   5A 9A AB 84 30 7D E0 72  ........Z...0..r
#           0010: C3 4D 2B 44                                        .M+D
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.278 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.333 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "08 65 FF C3",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 17:37:01.000 UTC",
#     "not  after"         : "2024-01-14 17:37:01.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#         0010: 36 8F C4 5C                                        6..\
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#         0010: DA 45 49 9F                                        .EI.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.335 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 15 BB 2B F3 2F B7 9F 41   99 0E 27 52 C3 4C 3B A8  ..+./..A..'R.L;.
#     0010: 5E 7F FD AB 47 C1 A5 64   FD D4 95 D6 D6 C3 3A E5  ^...G..d......:.
#     0020: D7 6A E2 C3 25 1E F2 0D   D9 F1 99 65 C6 73 ED 54  .j..%......e.s.T
#     0030: A9 27 E3 60 52 AC 57 3C   CB 05 4A BC BC C5 FA B0  .'.`R.W<..J.....
#     0040: B6 04 0A E7 9C 04 4F 27   E3 2B 7C 6C 28 4C 02 FE  ......O'.+.l(L..
#     0050: 93 F7 9F 12 07 7E D4 D3   95 68 8D B5 66 6A 35 42  .........h..fj5B
#     0060: 1B 8E D5 30 93 81 70 78   ED 52 0D 59 42 22 B4 1C  ...0..px.R.YB"..
#     0070: C9 A5 FA C6 3C C1 F3 EA   0A EB 33 E0 FD 9E A7 A3  ....<.....3.....
#     0080: 48 79 89 75 8F 74 0E F6   B1 89 A1 33 2F 0F 86 16  Hy.u.t.....3/...
#     0090: D8 87 32 D0 6E 2C 1D DA   EC 44 DB 92 6A 61 DF FD  ..2.n,...D..ja..
#     00A0: 4E 91 33 7D 51 32 5A 44   82 DC 37 A3 36 74 50 31  N.3.Q2ZD..7.6tP1
#     00B0: DE C8 04 A1 0C 17 69 EE   46 C7 6F 74 3F 39 2B F0  ......i.F.ot?9+.
#     00C0: 1C D6 AE A2 C0 83 B4 D8   C2 EF 31 97 CD 4A F4 8E  ..........1..J..
#     00D0: B0 53 40 53 EF 38 04 55   09 6A 33 CB 9E 11 1F 98  .S@S.8.U.j3.....
#     00E0: BF 14 FF F4 DC D7 63 49   B2 0F BA 54 A4 8A 46 3B  ......cI...T..F;
#     00F0: FA 23 62 51 D9 0E C4 20   5C A9 44 47 1F FE EF 5C  .#bQ... \.DG...\
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.337 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: B5 E4 64 AF 17 E4 FB AC   F6 BB 03 8D D5 68 63 3D  ..d..........hc=
#     0010: E6 E1 D0 B4 14 D9 93 CC   56 E9 15 AE 9E 9C 2B F8  ........V.....+.
#     0020: 53 6C BC E3 99 F0 C0 5F   C4 57 90 8F D0 F3 44 03  Sl....._.W....D.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.338 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:27.339 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.339 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:27.339 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.339 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 17:37:27.340 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 17:37:27.340 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.340 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.342 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "53 38 C3 7C",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:07.000 UTC",
#       "not  after"         : "2024-01-14 17:37:07.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: A6 95 3F 5F E8 65 06 02   82 97 C9 E1 D6 D6 28 F4  ..?_.e........(.
#           0010: F2 D9 39 F5                                        ..9.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 65 FF C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:01.000 UTC",
#       "not  after"         : "2024-01-14 17:37:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#           0010: 36 8F C4 5C                                        6..\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.365 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 58 96 0F 92 95 60 C8 EB   7D 35 C7 CD 25 23 D6 12  X....`...5..%#..
#     0010: FB DD 07 6E BD 67 CA 4C   A1 46 40 E2 02 16 3F 7C  ...n.g.L.F@...?.
#     0020: 38 93 BE 83 CA D2 25 3B   79 F7 B1 B3 BA C7 44 B3  8.....%;y.....D.
#     0030: 31 9A 41 AF C9 39 1C E1   5C 02 9D 06 92 93 0D 03  1.A..9..\.......
#     0040: F0 07 03 9F 15 2E E8 A2   B4 00 BC 54 95 06 20 DB  ...........T.. .
#     0050: 3A 56 8A F2 7D E8 45 0D   C9 D3 23 C7 9D 5B AD D8  :V....E...#..[..
#     0060: 43 DC BC A1 31 CF F4 6A   BD 7C 98 89 7B 17 BC 25  C...1..j.......%
#     0070: D3 0C 9F 80 B5 EE A8 C0   66 56 2F CC C7 23 4A 0B  ........fV/..#J.
#     0080: 79 F8 CC 88 94 6C AB D1   02 7E 3D F2 DC 86 67 B8  y....l....=...g.
#     0090: 52 23 DD 0A D7 7E 6D E3   F8 15 D7 0D 2B EE 29 5F  R#....m.....+.)_
#     00A0: AF AF 91 02 0D D2 DC 8C   58 9E F4 08 DC 35 69 5E  ........X....5i^
#     00B0: E6 B3 22 AF 7F 26 6C BD   75 8E 25 E4 94 B2 BE 52  .."..&l.u.%....R
#     00C0: CF 6E B7 C5 95 72 45 5A   60 D1 D1 8B 3A 7B E7 17  .n...rEZ`...:...
#     00D0: 01 97 92 C5 2D 27 75 E8   55 29 66 E5 79 43 13 B0  ....-'u.U)f.yC..
#     00E0: 48 4D 58 08 79 90 E6 D4   81 AF 2A 1E ED CA E7 51  HMX.y.....*....Q
#     00F0: 30 14 29 15 34 89 DE 4D   9E A2 AE B2 8B 01 98 51  0.).4..M.......Q
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.366 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: D9 A4 35 92 C7 49 AC 42   11 AA E1 D1 CD 41 DA 0B  ..5..I.B.....A..
#     0010: 13 C0 00 56 F7 75 3E 28   3D 07 4A 63 16 16 E2 C0  ...V.u>(=.Jc....
#     0020: 07 6C 08 5B 54 2F 59 B8   E7 6F A9 F1 FF E8 B8 AE  .l.[T/Y..o......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.366 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 17:37:27.428 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C2 34 6B FC 82 E0 20 01 8A B0 A1 98 E5 00 4F 88 7C 2B 1D 1A 7E F8 6C A5 EF 93 0B A8 C2 92 3E 5B",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-16 17:37:27.737 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 17:37:27.737 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 17:37:27.738 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-16 17:37:41.582; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:41.945 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "5C 9A 1D 91",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:36:58.000 UTC",
#       "not  after"         : "2024-01-14 17:36:58.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#           0010: 36 8F C4 5C                                        6..\
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "08 65 FF C3",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 17:37:01.000 UTC",
#       "not  after"         : "2024-01-14 17:37:01.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 9A B6 8D A2 CD BC 87 C0   32 FE 24 61 84 4A 4B 14  ........2.$a.JK.
#           0010: 36 8F C4 5C                                        6..\
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 3F A5 DE 35 30 A5 E0 D2   20 F5 8E B2 C3 C4 49 B9  ?..50... .....I.
#           0010: DA 45 49 9F                                        .EI.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 17:37:41.959 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:42.117 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.117 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:42.119 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 17:37:42.119 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.124 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.135 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.135 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.135 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 17:37:42.137 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "2F 31 9D A7 2B 4D 43 15 A1 36 65 75 C9 D5 D9 C6 17 6E 4F 4E 16 C0 7C 38 3D A7 E3 B5 30 0B 5D 05",
#     "session id"          : "4D 28 07 AE 2F 56 D8 39 5B 39 40 62 C4 06 F5 4D 98 E6 A3 23 38 0A A1 BC 84 E5 3F DF 87 88 80 53",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 7F 25 D1 3F FC 20 80 BD   E2 0C 95 01 E5 A4 D2 82  .%.?. ..........
#

[...truncated too long message...]

 C=US",
#     "not before"         : "2013-08-01 12:00:00.000 UTC",
#     "not  after"         : "2038-01-15 12:00:00.000 UTC",
#     "subject"            : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 22 54 20 18 95 E6 E3   6E E6 0F FA FA B9 12 ED  N"T ....n.......
#         0010: 06 17 8F 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 8A 5D 07 EC 55 D2 32 D5 B7 E3 B6 5F 01 EB 2D DC E4 D6 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "not before"         : "2015-10-19 07:43:30.000 UTC",
#     "not  after"         : "2035-10-19 07:43:30.000 UTC",
#     "subject"            : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 16 A9 4A 18 B5 CB CC   F5 6F 50 F3 23 5F F8 5D  ...J.....oP.#_.]
#         0010: E7 AC F0 C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 16141ms
ok 75 stop command for single port in 17456ms
not ok 76 status detects locally running solr in 1557ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 8039ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1509ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3131ms
ok 80 copying files around in 6734ms
ok 81 upconfig in 2685ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1241ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1255ms
not ok 84 Cleanup in 2581ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 47s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/usxsvmypmhv7o

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8198 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8198/

All tests passed

Build Log:
[...truncated 1437 lines...]
BUILD FAILED in 1h 2m 55s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/wfo7odqimhdjk

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8197 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8197/

All tests passed

Build Log:
[...truncated 1261 lines...]
# ERROR: Error from server at http://localhost:41733/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16985ms
ok 57 Check help command in 4862ms
ok 58 basic post with a type specified in 5817ms
ok 59 basic post WITHOUT a type specified in 12488ms
ok 60 crawling a directory in 5132ms
ok 61 crawling a web site in 5123ms
ok 62 commit and optimize and delete in 3855ms
ok 63 args mode in 6613ms
ok 64 stdin mode in 3406ms
ok 65 post solr log into solr via script in 10137ms
ok 66 post solr log into solr via cli in 7194ms
ok 67 allowPaths - backup in 17267ms
ok 68 start solr with ssl in 19272ms
not ok 69 use different hostname when not checking peer-name in 21728ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 41733 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41733 (pid=681577). Happy searching!
#
#     INFO  - 2023-10-16 12:03:44.839; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 12:03:44.844; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 12:03:45.263; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 12:03:45.375; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 12:03:45.375; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@72bd06ca[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-16 12:03:56.177; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 12:03:56.182; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-16 12:03:56.560; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@1a1da881[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:41733/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-16 12:03:58.092; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 12:03:58.096; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:41733/solr] to [https://127.0.0.1:41733].
# WARN  - 2023-10-16 12:03:58.971; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 12:03:59.042; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17513ms
ok 71 start solr with client truststore and security manager in 20098ms
not ok 72 start solr with mTLS needed in 53021ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-isVlFD/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 41733 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41733 (pid=684325). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 41734 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 41734 (pid=684437). Happy searching!
#
#     INFO  - 2023-10-16 12:05:02.858; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 12:05:02.864; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 12:05:03.776; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@52b56a3e(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 12:05:03.780; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@89c10b7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 12:05:03.784; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(ca,h=[localhost],a=[],w=[]) for Client@7e809b79[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:03.862 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 8E 23 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:48.000 UTC",
#     "not  after"         : "2024-01-14 12:04:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 BB FF 64 4E FF 30 29   B8 67 4B B4 F2 4E 12 88  ...dN.0).gK..N..
#         0010: 25 37 52 52                                        %7RR
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:03.872 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 95 6D 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:39.000 UTC",
#     "not  after"         : "2024-01-14 12:04:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:03.891 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:04.240 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.241 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:04.242 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:04.243 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.247 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.258 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.259 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.259 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:04.260 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "70 74 C3 80 4E F6 F9 8A 70 CC 27 6A 1B 04 3C E4 E6 54 32 14 17 31 5A 5F FA AD E5 45 92 C0 B6 DE",
#   "session id"          : "87 7B FE 9E 49 D1 83 E2 9B AC 34 AD F9 C1 65 03 67 83 1F 05 D1 B0 77 6E 24 E8 DF 87 C3 C8 68 1A",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 1A 01 2B D8 4C DA 89 99   E3 03 D3 8F 22 6E 0C 27  ..+.L......."n.'
#             0010: 76 9E AB FB 43 EA 25 ED   24 97 36 AB 7E 76 6B 31  v...C.%.$.6..vk1
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.525 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "F9 2E 0B 39 53 EE B3 F4 85 31 8A 8D 3A 22 B6 BA DF E5 E5 DC 40 04 49 00 9C E6 58 12 F0 DB D7 68",
#   "session id"          : "87 7B FE 9E 49 D1 83 E2 9B AC 34 AD F9 C1 65 03 67 83 1F 05 D1 B0 77 6E 24 E8 DF 87 C3 C8 68 1A",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 0E F3 CF C3 C7 66 59 85   17 7B B7 4F 65 77 22 80  .....fY....Oew".
#           0010: D0 B7 59 5A FF DF FD EC   56 57 A5 91 5B 95 EA 39  ..YZ....VW..[..9
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.526 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.526 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.527 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.528 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.529 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.529 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.949 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.949 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.949 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.950 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.978 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.981 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.982 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.992 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.992 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.996 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:04.999 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.000 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.000 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.000 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.000 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.014 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.014 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.014 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.014 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.015 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.016 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.016 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.023 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 8A BD 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:44.000 UTC",
#       "not  after"         : "2024-01-14 12:04:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F4 BA 7B ED 3C 3A C7   77 F4 9D B4 33 65 C5 59  .....<:.w...3e.Y
#           0010: 88 98 1D 8D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.023 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.140 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.154 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 60 4A 72 A6 34 21 59 64   60 0E 5F 08 D1 73 BB 3E  `Jr.4!Yd`._..s.>
#     0010: BA 21 0A 0F B4 F9 5E 5B   93 D6 02 D1 68 45 AB 02  .!....^[....hE..
#     0020: D0 02 84 72 A5 56 73 E5   69 D8 90 E8 17 94 E3 16  ...r.Vs.i.......
#     0030: D7 97 7F BC 73 EB D8 20   C9 07 93 6A 49 52 84 D6  ....s.. ...jIR..
#     0040: 73 C2 CF C7 24 84 17 C3   34 C5 24 5E EC 73 1B 05  s...$...4.$^.s..
#     0050: 6B A4 35 FF AC 5D A9 27   17 89 AA 9B 57 F9 32 ED  k.5..].'....W.2.
#     0060: 2D A0 52 C2 D1 6B B0 77   B0 08 8A 74 FF B5 45 91  -.R..k.w...t..E.
#     0070: 7E DE 81 2F 5C 7D EA CD   4C 13 31 CC D5 EC 34 8A  .../\...L.1...4.
#     0080: 03 4B B1 5D 57 11 C4 8E   B5 1C 1E 63 9D FD A1 7C  .K.]W......c....
#     0090: 34 A0 49 F6 6F 6F FE 23   E1 65 08 EA B0 F2 DA 52  4.I.oo.#.e.....R
#     00A0: 01 B5 AC 63 4E 05 D8 2C   0C 32 80 AF 17 F7 75 B9  ...cN..,.2....u.
#     00B0: 5B 55 1D 78 B1 47 78 00   4E 1B D5 85 53 CD 6D 6E  [U.x.Gx.N...S.mn
#     00C0: D9 A1 FE 77 AB 38 C0 18   64 05 1C E4 A1 4D 0B 9D  ...w.8..d....M..
#     00D0: EC B5 D8 A3 4A AB 5D 7D   E6 ED 1A BC D0 65 D6 A4  ....J.]......e..
#     00E0: 32 F6 C7 C8 D2 23 D2 81   46 50 BF 37 AD BF CA E5  2....#..FP.7....
#     00F0: B1 A1 2F 9C C1 ED 8E B9   06 64 49 3F 11 0E B5 5F  ../......dI?..._
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.156 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EF 97 B3 27 98 BB EF 78   8A 8C 13 37 A6 AE ED 0F  ...'...x...7....
#     0010: AF 5E 58 E2 48 57 D4 8E   2A F0 CA 2E 50 30 74 9C  .^X.HW..*...P0t.
#     0020: 04 D3 5F EA 6A 82 C6 31   E6 F2 9E 8A 1F 0E 6A F1  .._.j..1......j.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.160 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:05.161 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.161 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:05.161 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.163 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:05.163 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:05.163 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.164 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.166 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 8E 23 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:48.000 UTC",
#       "not  after"         : "2024-01-14 12:04:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 84 BB FF 64 4E FF 30 29   B8 67 4B B4 F2 4E 12 88  ...dN.0).gK..N..
#           0010: 25 37 52 52                                        %7RR
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 65 D0 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:41.000 UTC",
#       "not  after"         : "2024-01-14 12:04:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#           0010: 3A AD D2 2B                                        :..+
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.209 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 0F 38 9B CA 37 0F 90 A4   CE 7A AB D4 A7 B3 1E 53  .8..7....z.....S
#     0010: 5D 62 C5 A0 49 83 DE 0F   26 6E FC CE 6C 1D 99 20  ]b..I...&n..l..
#     0020: 4C AF 07 2E 2D 00 C6 76   98 05 A3 35 31 24 33 48  L...-..v...51$3H
#     0030: D7 50 22 B6 18 1F C1 0A   2F 2C BE D3 54 63 C4 BB  .P"...../,..Tc..
#     0040: AB 8A 78 22 61 97 76 F3   40 70 2A 25 D8 19 87 A8  ..x"a.v.@p*%....
#     0050: A4 FD 8B 4F EB 2A DB 84   AB 78 66 CC 45 01 70 3C  ...O.*...xf.E.p<
#     0060: 4B 60 86 30 1F 0C 5D 0B   0F 0A 9E A7 1E E9 F0 D2  K`.0..].........
#     0070: CA 69 1F 64 42 4E 79 F6   44 DD 8C 14 EE B5 D8 37  .i.dBNy.D......7
#     0080: A2 3A 71 8F 6D B0 70 9A   32 0C CC 6B E6 DB AA B1  .:q.m.p.2..k....
#     0090: 13 84 27 7B 58 79 3E AA   54 F9 44 22 2D A0 D2 9B  ..'.Xy>.T.D"-...
#     00A0: 08 AC 41 48 BA 04 82 29   85 75 3D 80 B8 B6 C6 61  ..AH...).u=....a
#     00B0: 14 51 07 58 A8 DD 45 09   51 EE 78 02 1B 4B 1C 55  .Q.X..E.Q.x..K.U
#     00C0: 6B B6 DC 4D 52 C4 1B 1E   07 81 1D 9C A9 B9 21 3C  k..MR.........!<
#     00D0: FE 8B 6E C0 95 C1 D9 1C   6D 77 A6 C6 EA 3C 2F ED  ..n.....mw...</.
#     00E0: AE E9 F6 EE CD 9D B3 4C   02 4C 80 F4 5F 0C F8 EC  .......L.L.._...
#     00F0: AD B3 DF EF 03 5E 38 A7   82 0C 65 AB 9E E5 E0 5C  .....^8...e....\
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.210 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 7A B4 75 11 FC 72 3A FB   B3 A2 6D 7D FA FC B0 4F  z.u..r:...m....O
#     0010: 09 4D 79 3E C8 B9 3C FE   A0 12 54 EF 4A 29 E4 FD  .My>..<...T.J)..
#     0020: AC A1 DB 89 A6 25 99 41   EA F5 E3 74 AC E2 7E 65  .....%.A...t...e
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.211 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:05.541 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:05.542 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:05.542 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:05.542 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:05.560 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "48 79 42 9D CF 8F 9C C0 C6 49 DC 29 6B 2E 1A BF 18 89 E4 D2 5D 5E AC 6B E4 86 43 93 6D F9 6B F1",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 12:05:05.892 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 12:05:05.893 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 12:05:07.283; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 12:05:07.288; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 12:05:07.673; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2c1b9e4b(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 12:05:07.675; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@226642a5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 12:05:07.675; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7e809b79(ca,h=[localhost],a=[],w=[]) for Client@6326d182[provider=null,keyStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-isVlFD/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:07.708 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "09 8E 23 01",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:48.000 UTC",
#     "not  after"         : "2024-01-14 12:04:48.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 84 BB FF 64 4E FF 30 29   B8 67 4B B4 F2 4E 12 88  ...dN.0).gK..N..
#         0010: 25 37 52 52                                        %7RR
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:07.712 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "10 95 6D 81",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:39.000 UTC",
#     "not  after"         : "2024-01-14 12:04:39.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:07.725 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:07.917 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.917 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:07.920 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:07.920 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.926 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.937 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.937 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.937 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:07.939 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "0E 00 6C 54 FA C0 79 E0 E2 02 BD 6B 87 29 85 EC 81 9D 63 FC AA 29 0E BB B3 1F F4 E8 F7 05 53 4A",
#   "session id"          : "85 A8 F4 A8 FE 59 6F EE 58 E1 18 24 66 35 E0 43 35 57 C7 F1 17 4C A3 54 44 15 14 15 D0 FC 37 94",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 6D 7C C8 26 DF 0F C8 0A   52 1F FF 4E 2C 13 7B 25  m..&....R..N,..%
#             0010: 05 4D F2 2A A3 7A AC 19   B4 A5 5E AA FB E5 FB 22  .M.*.z....^...."
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.058 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "8E 9B 19 73 CC 01 96 4C 58 08 03 3F F8 05 84 DC 13 5E DB AF 48 59 32 C5 D8 AE C1 83 85 A6 45 A3",
#   "session id"          : "85 A8 F4 A8 FE 59 6F EE 58 E1 18 24 66 35 E0 43 35 57 C7 F1 17 4C A3 54 44 15 14 15 D0 FC 37 94",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: FE 24 3C 4A 8C D3 9C 68   4C DE CC 94 89 18 0A 3A  .$<J...hL......:
#           0010: 66 39 FA 1F BD 91 C2 33   57 91 26 9B 89 AC 96 74  f9.....3W.&....t
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.059 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.059 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.065 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.075 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.076 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.097 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.098 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.100 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.116 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.116 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.116 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.117 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.117 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.117 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.118 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.118 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.121 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.121 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.122 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.124 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.125 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.125 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.126 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.137 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 8A BD 68",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:44.000 UTC",
#       "not  after"         : "2024-01-14 12:04:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: AC F4 BA 7B ED 3C 3A C7   77 F4 9D B4 33 65 C5 59  .....<:.w...3e.Y
#           0010: 88 98 1D 8D                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.137 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.212 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 65 D0 58",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 12:04:41.000 UTC",
#     "not  after"         : "2024-01-14 12:04:41.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#         0010: 3A AD D2 2B                                        :..+
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#         0010: F5 80 3D 8E                                        ..=.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.301 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 83 31 07 DC 30 37 B6 68   0F C6 E3 DC 77 6E AB 2E  .1..07.h....wn..
#     0010: 55 E1 38 C3 EC 31 B8 B9   F4 B9 4C F5 D1 4C A7 DB  U.8..1....L..L..
#     0020: A7 8F 1F DF B8 94 BA 1B   85 F8 18 23 F4 70 68 14  ...........#.ph.
#     0030: C8 B1 76 9D 68 5B 1D 82   BF 16 CA AB 12 BA 39 DF  ..v.h[........9.
#     0040: 02 01 48 A8 B3 2C 31 86   6F C2 6C 5F 9D FF 00 67  ..H..,1.o.l_...g
#     0050: 69 56 5B 45 A7 64 B6 53   15 7B 9C 47 ED 5F 86 22  iV[E.d.S...G._."
#     0060: C5 4A 2C CC 09 7B 2E C1   6B 64 CD 0A 3E 9F A9 6E  .J,.....kd..>..n
#     0070: 8D EE 9A 4D 51 88 A1 CF   1D 3B BB 18 69 F2 7D 45  ...MQ....;..i..E
#     0080: 95 4F 0F 55 50 97 7F 6D   AC 74 3B 43 E8 9A 82 C9  .O.UP..m.t;C....
#     0090: ED F4 20 AD 77 88 4A 66   BB 76 F8 40 CF AC 51 5B  .. .w.Jf.v.@..Q[
#     00A0: 39 7D 61 24 B3 EF 0C 51   4F 10 51 AD 3C E7 FF F0  9.a$...QO.Q.<...
#     00B0: 8E BC B4 81 48 C8 5E F2   AD 93 D6 77 E6 F7 2B 5A  ....H.^....w..+Z
#     00C0: 06 1C 10 28 DD AA C8 0F   79 8A D1 D5 1D D6 36 26  ...(....y.....6&
#     00D0: 93 BC 0C 46 E1 52 E7 6A   25 20 04 06 C9 1E 8F F2  ...F.R.j% ......
#     00E0: 46 36 A2 43 98 93 3F F3   95 18 F3 B8 DF 74 5B B6  F6.C..?......t[.
#     00F0: 38 05 96 C5 0F 38 7D 1C   AE E3 8A 4B 8F 1D BA 39  8....8.....K...9
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.303 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 44 3A E8 D4 E0 60 90 F9   D7 7E 26 37 12 33 52 9B  D:...`....&7.3R.
#     0010: 42 28 06 E8 FE DE 79 CC   DA 5C 32 79 82 27 0C AB  B(....y..\2y.'..
#     0020: 0B 71 27 41 70 33 76 44   37 C3 EC 1E 3B DA E6 4A  .q'Ap3vD7...;..J
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.305 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:08.305 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.306 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.309 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "09 8E 23 01",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:48.000 UTC",
#       "not  after"         : "2024-01-14 12:04:48.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 84 BB FF 64 4E FF 30 29   B8 67 4B B4 F2 4E 12 88  ...dN.0).gK..N..
#           0010: 25 37 52 52                                        %7RR
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 65 D0 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:41.000 UTC",
#       "not  after"         : "2024-01-14 12:04:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#           0010: 3A AD D2 2B                                        :..+
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.335 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7A 5F 74 21 10 53 E2 5A   CF 90 70 B2 F2 0A B8 A2  z_t!.S.Z..p.....
#     0010: 07 66 9D E5 B2 5D 36 9C   16 E0 13 69 50 25 FC 66  .f...]6....iP%.f
#     0020: 9D 6A 6A A3 63 94 DF 93   8F E5 33 8C E9 6D 81 52  .jj.c.....3..m.R
#     0030: 92 6B F3 F9 46 8F BD 8B   CE 67 38 15 C6 51 AF 46  .k..F....g8..Q.F
#     0040: C5 F5 4E 9D 22 8F DD 03   CD 83 BC BB FD EC 12 4D  ..N."..........M
#     0050: 5B ED BC 36 0F 51 AF 47   C1 48 51 45 14 33 84 2A  [..6.Q.G.HQE.3.*
#     0060: A7 8C EF 0C E2 54 E8 AF   09 89 71 19 56 9B 2B 97  .....T....q.V.+.
#     0070: 63 D7 63 74 15 84 61 4F   77 1C 29 08 1C 6D A7 E1  c.ct..aOw.)..m..
#     0080: F5 FD 5B 22 C0 E2 EE B2   3E 56 85 1F BA 71 C6 90  ..["....>V...q..
#     0090: 9F B9 1A 48 B2 31 00 28   F4 2A 61 1A E0 BD 4A 4D  ...H.1.(.*a...JM
#     00A0: 6B 4C E6 E2 F1 18 12 C9   5D E2 6F 3E 5E 31 A8 62  kL......].o>^1.b
#     00B0: DE 46 39 4C EC 2C 84 D9   28 F0 DF 53 D7 23 0A 5A  .F9L.,..(..S.#.Z
#     00C0: DB A9 A2 AD 85 A1 C0 50   09 10 C1 2E 57 FA DA 80  .......P....W...
#     00D0: C2 6A D0 02 56 BA C0 B1   80 43 46 F9 15 97 A6 46  .j..V....CF....F
#     00E0: 71 C0 2F B9 64 26 02 C3   18 C5 E9 3B 18 15 97 3A  q./.d&.....;...:
#     00F0: AA C0 44 D4 6D F9 8F E6   CA 5A D7 B1 99 B4 CA 14  ..D.m....Z......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.336 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 39 00 4D AA 26 0C 0F 2C   17 9B BC 30 C0 83 CD B8  9.M.&..,...0....
#     0010: 04 05 B1 F8 BF 8A E7 BA   43 DA 4C D0 29 BB 2B 34  ........C.L.).+4
#     0020: 93 9F BB E9 D8 F4 2C 82   B7 CF 9E 0D B8 93 90 09  ......,.........
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.337 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:08.399 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "FA 54 50 BB 5F F2 D6 F3 25 FC 8C E3 87 E3 26 82 00 F4 23 B5 27 45 EF 79 A7 95 5B 08 4F 01 FB 12",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:08.432 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:08.432 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:08.432 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 12:05:08.433 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-16 12:05:08.759 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 12:05:08.759 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-16 12:05:08.776 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-16 12:05:22.196; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:22.551 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 65 D0 58",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:41.000 UTC",
#       "not  after"         : "2024-01-14 12:04:41.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#           0010: 3A AD D2 2B                                        :..+
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: ED CE 6E D5 18 8D 7B 28   F9 84 B4 C3 24 37 AD 51  ..n....(....$7.Q
#           0010: F5 80 3D 8E                                        ..=.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "10 95 6D 81",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 12:04:39.000 UTC",
#       "not  after"         : "2024-01-14 12:04:39.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 75 6F 01 B4 49 31 EC F0   A8 A0 97 0D BE FA 67 6B  uo..I1........gk
#           0010: 3A AD D2 2B                                        :..+
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 12:05:22.565 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:22.874 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.874 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:22.876 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 12:05:22.876 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.880 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.892 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.892 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.892 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 12:05:22.894 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "85 A5 A4 F9 DF 0C C8 F3 0F 62 0F 7A 08 E3 B1 87 D0 15 32 08 CE C0 53 4C AC 81 1C C2 7F EA 01 20",
#     "session id"          : "59 D4 DF F5 9D E1 1A FD 1A 6E BC 5E 70 21 C3 31 69 EF 07 5B 7D 79 B4 B8 BB 00 17 FB 7E 0F 7F 12",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 42 67 7A AB C8 27 A0 46   63 4F 01 30 EF ED C2 88  Bgz..'.FcO.0....
#               0010: 89 91 23 65 25 6B 23 EC   BF EB 3A 39 0F EF 8A 55  ..#e%k#...:9...U
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.913 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "D6 52 95 85 F7 59 F9 80 1B 89 2E 4C 12 B7 B6 09 29 5B 3E 58 1A 9D 5C D4 E0 44 AA AD C1 DC 0D 6C",
#     "session id"          : "59 D4 DF F5 9D E1 1A FD 1A 6E BC 5E 70 21 C3 31 69 EF 07 5B 7D 79 B4 B8 BB 00 17 FB 7E 0F 7F 12",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: A8 08 E2 04 40 61 8A 81   C9 88 75 29 8D DC 1C 74  ....@a....u)...t
#             0010: 76 3F 79 30 58 A9 A4 90   82 74 0D B5 F4 1E 70 13  v?y0X....t....p.
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.913 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.914 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.914 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.914 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.915 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.917 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.918 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.924 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.925 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.927 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 12:05:22.930 UTC|EncryptedExtensions.java:171|Consuming EncryptedExte

[...truncated too long message...]

l$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14715ms
ok 75 stop command for single port in 18295ms
not ok 76 status detects locally running solr in 1512ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7489ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1485ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3037ms
ok 80 copying files around in 6633ms
ok 81 upconfig in 2622ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1261ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1256ms
not ok 84 Cleanup in 2522ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 35s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/nvwssesyqhwt6

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8196 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8196/

All tests passed

Build Log:
[...truncated 1259 lines...]
# ERROR: Error from server at http://localhost:34487/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16102ms
ok 57 Check help command in 4617ms
ok 58 basic post with a type specified in 5772ms
ok 59 basic post WITHOUT a type specified in 11999ms
ok 60 crawling a directory in 4482ms
ok 61 crawling a web site in 4756ms
ok 62 commit and optimize and delete in 4021ms
ok 63 args mode in 6506ms
ok 64 stdin mode in 3553ms
ok 65 post solr log into solr via script in 10495ms
ok 66 post solr log into solr via cli in 7273ms
ok 67 allowPaths - backup in 16273ms
ok 68 start solr with ssl in 19650ms
not ok 69 use different hostname when not checking peer-name in 20992ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 34487 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34487 (pid=390055). Happy searching!
#
#     INFO  - 2023-10-16 09:44:51.334; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 09:44:51.339; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 09:44:51.769; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 09:44:51.868; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-16 09:44:51.868; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-16 09:45:02.146; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-16 09:45:02.152; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-16 09:45:02.542; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4c168660(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@226642a5[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:34487/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-16 09:45:03.996; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 09:45:04.002; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:34487/solr] to [https://127.0.0.1:34487].
# WARN  - 2023-10-16 09:45:04.838; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-10-16 09:45:04.881; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 17158ms
ok 71 start solr with client truststore and security manager in 19342ms
not ok 72 start solr with mTLS needed in 52667ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-KZkkCp/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 34487 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34487 (pid=392773). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 34488 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 34488 (pid=392898). Happy searching!
#
#     INFO  - 2023-10-16 09:46:07.351; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 09:46:07.355; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 09:46:07.915; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@6256ac4f(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 09:46:07.928; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 09:46:07.930; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@475835b1(ca,h=[localhost],a=[],w=[]) for Client@52b56a3e[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:07.988 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 5E 40 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:53.000 UTC",
#     "not  after"         : "2024-01-14 09:45:53.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 9F A8 B5 42 0A A3 17   1E A2 92 DA 07 DE 48 77  ....B.........Hw
#         0010: 1F D1 7F A0                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:07.992 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "39 3C 4D AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:44.000 UTC",
#     "not  after"         : "2024-01-14 09:45:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:08.015 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:08.733 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.733 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:08.737 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:08.737 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.745 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.758 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.758 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.758 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:08.760 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "58 1C 8A 86 96 4F 31 51 49 A7 23 AB E2 74 6B AB 54 06 93 F7 4E 92 25 C9 43 11 DD 41 F0 01 F9 76",
#   "session id"          : "63 AA 6E 91 53 32 61 63 E7 21 C7 7C FB 37 AF A0 E1 58 28 A4 CF C1 5F 09 D5 85 64 80 9A 54 59 A9",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 60 4D 3A D2 BE 40 6F A6   0E 1A 77 AA 50 E2 6D 2A  `M:..@o...w.P.m*
#             0010: 9B D0 B4 83 20 00 DB 89   1A A8 31 2D A6 84 D9 3C  .... .....1-...<
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.919 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "42 59 42 DF 63 61 92 C6 34 B9 06 8C E3 B2 B7 3A 35 0A 40 F9 ED 65 5E 0E 0F 13 16 22 1E 0F 7A BF",
#   "session id"          : "63 AA 6E 91 53 32 61 63 E7 21 C7 7C FB 37 AF A0 E1 58 28 A4 CF C1 5F 09 D5 85 64 80 9A 54 59 A9",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 42 23 63 1A D0 71 D7 0D   78 89 C2 70 F9 B9 1C 1E  B#c..q..x..p....
#           0010: 87 4B 70 55 3B A0 41 62   28 BE 57 00 DA 03 99 52  .KpU;.Ab(.W....R
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.919 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.920 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.932 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.935 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.940 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.940 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.940 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.941 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.942 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.967 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.969 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.975 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.989 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.990 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.990 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.994 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.995 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.995 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.996 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:08.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:08.996 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.998 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.998 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:08.999 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.002 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.003 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.006 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:09.006 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.008 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 BC 41 2B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:48.000 UTC",
#       "not  after"         : "2024-01-14 09:45:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 6B 78 00 DB 70 07 AC   C5 24 7F BB 0E 71 D3 55  .kx..p...$...q.U
#           0010: 43 DE 2D 9E                                        C.-.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.009 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.153 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.365 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 18 8B DC 7A 93 4D FB 5F   2B 37 A1 BA 34 D9 58 1C  ...z.M._+7..4.X.
#     0010: F2 43 1C 99 C9 73 FA FD   8D 4F E6 BE 8D 79 7B E9  .C...s...O...y..
#     0020: F7 F2 5B 0E 1A 46 15 BF   5E 48 8A 82 46 C9 3C 67  ..[..F..^H..F.<g
#     0030: FA 3A A4 24 A7 00 50 24   C5 FA 24 C6 08 A5 78 6E  .:.$..P$..$...xn
#     0040: 78 07 8C E4 EC 00 7F 8B   55 05 2A 4E 83 56 D4 9E  x.......U.*N.V..
#     0050: 9A 60 FD A7 BC D1 76 6B   8C 27 E7 8E 1F 0F 18 25  .`....vk.'.....%
#     0060: 60 0B 29 2D EA AC BE 42   5B E4 EE D0 68 DA B8 5B  `.)-...B[...h..[
#     0070: 98 BD 5E 02 5E B7 5E 58   11 0D 80 BD 65 13 E5 94  ..^.^.^X....e...
#     0080: A5 84 DA 36 EB E6 47 BE   6E 79 85 85 C6 BE 3A 09  ...6..G.ny....:.
#     0090: 66 30 CA 92 4D DA F4 BD   F1 A0 A7 EB C5 9D 51 19  f0..M.........Q.
#     00A0: 19 88 90 19 2B 0C B9 37   4B F6 6E 73 A9 64 CC D5  ....+..7K.ns.d..
#     00B0: B0 43 B1 12 04 AE 8D A6   7B 5C C0 0F B7 9C 2F 07  .C.......\..../.
#     00C0: C8 47 A7 F4 CD BA F6 20   E2 8D F2 18 2D F1 0C D7  .G..... ....-...
#     00D0: F9 61 B6 89 B6 2F 45 DE   C5 E4 50 07 38 3A E2 E8  .a.../E...P.8:..
#     00E0: 67 67 5B 44 56 CB BE AE   DA 1F 17 22 CA 62 CA BF  gg[DV......".b..
#     00F0: 4F 7E 19 61 36 1F 1D 8D   AF AC 7A D6 34 0F 73 D2  O..a6.....z.4.s.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.367 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E7 55 68 6D 80 60 FB A9   D6 12 47 F3 AE A2 00 DA  .Uhm.`....G.....
#     0010: 2E 29 6F E9 BA AE 65 97   39 A5 CB 4F 1A 4C DE BE  .)o...e.9..O.L..
#     0020: BF F2 AF 5B 80 E5 1B 9D   D6 36 77 63 86 BE BA 74  ...[.....6wc...t
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.394 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:09.395 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:09.395 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:09.395 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:09.395 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:09.395 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:09.396 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.396 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.410 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 5E 40 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:53.000 UTC",
#       "not  after"         : "2024-01-14 09:45:53.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 9F A8 B5 42 0A A3 17   1E A2 92 DA 07 DE 48 77  ....B.........Hw
#           0010: 1F D1 7F A0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 E0 D7 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:46.000 UTC",
#       "not  after"         : "2024-01-14 09:45:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#           0010: 0E 6C D4 1B                                        .l..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.443 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 24 7B 34 CB 85 54 08 EA   98 32 23 61 AA B7 15 70  $.4..T...2#a...p
#     0010: 23 E1 0B 2C 6C 60 6F 27   36 88 95 88 D3 12 40 28  #..,l`o'6.....@(
#     0020: 40 5D 32 A0 C7 C5 1B 12   92 EB 42 30 7C 94 F0 B8  @]2.......B0....
#     0030: 5D 4B A9 30 18 42 77 A8   3C 71 82 4F E1 EB CA BC  ]K.0.Bw.<q.O....
#     0040: A3 8F B2 02 76 C7 09 3F   8F 4E 95 45 A6 6F 81 95  ....v..?.N.E.o..
#     0050: 3D 17 AC A0 B9 A7 26 C3   66 00 B9 C8 E7 C2 E6 25  =.....&.f......%
#     0060: D0 2B 4D 04 F0 51 67 C4   3C 54 83 F7 27 7E F1 FB  .+M..Qg.<T..'...
#     0070: 7A B8 52 60 64 BA CA 58   42 55 76 E7 0A 8E 5B 1B  z.R`d..XBUv...[.
#     0080: 03 10 C1 42 BD 7E B8 FF   F6 3A F4 72 9C DC 7A B5  ...B.....:.r..z.
#     0090: AA E8 B1 E9 8C 42 A5 D7   6E 93 B1 49 44 2A 97 16  .....B..n..ID*..
#     00A0: 51 65 7E 70 12 B1 C6 3A   CF 90 E3 D4 DD DC 38 76  Qe.p...:......8v
#     00B0: E8 A0 A6 1C AD 61 09 BD   31 E8 20 40 FA DA 26 BF  .....a..1. @..&.
#     00C0: 9E 23 60 9A 7F C0 47 0A   03 DB 1B 0D B8 33 39 A6  .#`...G......39.
#     00D0: C7 01 D3 54 C8 6B 16 92   66 71 F2 15 28 FF F5 C9  ...T.k..fq..(...
#     00E0: 92 97 8F 16 DF 4E 8D 43   46 BA 24 77 C1 0C BB 10  .....N.CF.$w....
#     00F0: C6 46 81 BF 47 8F DD 83   B4 36 5F 74 2C 17 BA CA  .F..G....6_t,...
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.447 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 0B B9 E8 97 C5 E5 B6 70   62 E6 9F 27 FA A9 69 6D  .......pb..'..im
#     0010: BE EC 81 E6 01 A2 A4 F0   E7 3A EE 9D 50 A9 7A 0C  .........:..P.z.
#     0020: 1C 6C 3C EA DD C6 CD 7D   A0 47 D0 61 80 D6 9F D8  .l<......G.a....
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:09.450 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-16 09:46:09.515 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "BB 7A 99 EE FD 03 8C 01 A4 55 C5 72 B9 A5 9B 32 08 43 E8 79 8E E6 E5 9B 7E B0 0F E8 9F FE 66 F7",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:09.586 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:09.586 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:09.586 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:09.586 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-10-16 09:46:10.170 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-16 09:46:10.170 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 09:46:10.171 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-16 09:46:11.671; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-16 09:46:11.676; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-16 09:46:12.090; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 09:46:12.092; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5cc126dc(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-16 09:46:12.092; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@625e134e(ca,h=[localhost],a=[],w=[]) for Client@716a7124[provider=null,keyStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-KZkkCp/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:12.125 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "1F 5E 40 A4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:53.000 UTC",
#     "not  after"         : "2024-01-14 09:45:53.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 19 9F A8 B5 42 0A A3 17   1E A2 92 DA 07 DE 48 77  ....B.........Hw
#         0010: 1F D1 7F A0                                        ....
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:12.128 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "39 3C 4D AA",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:44.000 UTC",
#     "not  after"         : "2024-01-14 09:45:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:12.141 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:12.303 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.304 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:12.305 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:12.306 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.311 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.323 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.323 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.324 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:12.327 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "39 1D DA 3D 50 05 B6 4C FF BB 03 7A C0 13 C5 B0 F3 E8 EF 62 B7 4F BB 06 FE 7B 02 0B 1C 78 38 DC",
#   "session id"          : "D2 41 8E A0 80 8F AC F8 73 3F CE FF 68 30 CC 3B 4A FA D8 5C 07 F4 68 FF A1 1D 58 66 2E D3 AC A4",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: FC 61 07 C8 90 1E 03 52   11 2E E3 8C A1 0B 76 2D  .a.....R......v-
#             0010: 85 5A 02 1C D1 57 BA 3B   DB 42 52 7D 48 E0 49 17  .Z...W.;.BR.H.I.
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.444 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "2D B7 F0 9F D8 C4 70 51 0D EF 1F EF 9B 8A 32 1E 18 60 72 9F 98 B9 9E A2 3D 21 85 24 BB 3A FC 36",
#   "session id"          : "D2 41 8E A0 80 8F AC F8 73 3F CE FF 68 30 CC 3B 4A FA D8 5C 07 F4 68 FF A1 1D 58 66 2E D3 AC A4",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 19 56 16 1F 25 21 0A BA   AA 7D 57 CB AE 9F 4B 7C  .V..%!....W...K.
#           0010: 78 65 C2 7D 1F A0 F5 0D   5B 57 34 84 92 43 A0 51  xe......[W4..C.Q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.444 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.445 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.452 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.452 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.456 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.456 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.457 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.458 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.458 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.458 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.470 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.475 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.476 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.479 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.481 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.481 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.481 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.483 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.483 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.483 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.483 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.484 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.484 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.485 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.485 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.486 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.486 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.486 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.489 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "07 BC 41 2B",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:48.000 UTC",
#       "not  after"         : "2024-01-14 09:45:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CB 6B 78 00 DB 70 07 AC   C5 24 7F BB 0E 71 D3 55  .kx..p...$...q.U
#           0010: 43 DE 2D 9E                                        C.-.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.490 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.951 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "04 E0 D7 A6",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-16 09:45:46.000 UTC",
#     "not  after"         : "2024-01-14 09:45:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#         0010: 0E 6C D4 1B                                        .l..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#         0010: 0B FC 19 35                                        ...5
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.954 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 6E E2 D5 E3 15 ED 3C 40   A7 8A 68 E2 29 13 BB 7D  n.....<@..h.)...
#     0010: 43 C5 C1 96 4F F2 DE CD   D2 E7 39 C7 8A 81 83 4A  C...O.....9....J
#     0020: 0A 41 E5 65 84 77 76 42   4D 53 94 F2 D9 B4 80 01  .A.e.wvBMS......
#     0030: 57 63 EC D4 AF DA 25 B2   39 FD A3 95 90 AF F5 BE  Wc....%.9.......
#     0040: 9E E3 27 CD 27 48 63 01   FD AB 3F 4D BF 09 B0 C3  ..'.'Hc...?M....
#     0050: 13 73 F7 14 26 19 06 49   24 DA C4 35 ED 67 06 05  .s..&..I$..5.g..
#     0060: B2 3F 9C 88 0C 71 F3 4B   23 B7 A2 CE D5 7F A2 5E  .?...q.K#......^
#     0070: 8C 2C 76 F3 FB 44 04 45   4B 9E 48 DB AA 30 7E 52  .,v..D.EK.H..0.R
#     0080: 56 6F F1 12 76 CD DC 9C   87 AF 40 7D 73 84 67 12  Vo..v.....@.s.g.
#     0090: FF 85 30 12 2E 22 2E D3   0D 93 2A A4 68 0C 6B 54  ..0.."....*.h.kT
#     00A0: CE 57 18 70 40 AF E6 A6   0E 9C 70 D5 4A F7 6C 11  .W.p@.....p.J.l.
#     00B0: F8 A3 07 A2 4B 7D 5A 0B   91 70 B9 AC 5B 53 41 4E  ....K.Z..p..[SAN
#     00C0: 8B D4 B4 2B 8E 57 54 51   34 7F C9 45 91 98 5E 52  ...+.WTQ4..E..^R
#     00D0: 4A FE 46 7E E4 10 1F F8   3D 1A DA 46 34 7B EE 0E  J.F.....=..F4...
#     00E0: 98 D2 0D D6 A1 4D 33 2F   35 61 CD 2E 40 89 D0 AE  .....M3/5a..@...
#     00F0: 0B 0A BE 3A F8 6E 91 E7   89 24 CC DC FD 9F BB FC  ...:.n...$......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.956 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 00 B8 14 07 88 50 88 52   07 0D AD 72 15 E1 B6 1D  .....P.R...r....
#     0010: 93 4E 90 8A F5 1C 38 C2   79 8A 1F 09 C6 5C 4E C6  .N....8.y....\N.
#     0020: 0C 5E F4 EF 33 CA C4 93   32 FA A8 9A 85 AF C4 FA  .^..3...2.......
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.958 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:12.959 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.959 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:12.959 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.960 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-16 09:46:12.960 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:12.960 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.960 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.962 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1F 5E 40 A4",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:53.000 UTC",
#       "not  after"         : "2024-01-14 09:45:53.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 19 9F A8 B5 42 0A A3 17   1E A2 92 DA 07 DE 48 77  ....B.........Hw
#           0010: 1F D1 7F A0                                        ....
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 E0 D7 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:46.000 UTC",
#       "not  after"         : "2024-01-14 09:45:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#           0010: 0E 6C D4 1B                                        .l..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.986 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1B 24 F4 DE 3C 7E 58 A1   CC E2 96 76 C1 CF 24 C6  .$..<.X....v..$.
#     0010: B4 E4 FA B5 80 9C 0F 2C   01 1B B9 7D 4B 19 0D 9B  .......,....K...
#     0020: 22 E1 59 4F A2 1C F0 A4   7C 7C CC 3C 8B DB EC AC  ".YO.......<....
#     0030: 6B 26 16 F1 6E 6E 15 70   17 FA 43 3D FC DE CA E8  k&..nn.p..C=....
#     0040: D8 EE 6F 1C 95 21 4C D1   E2 9C F9 A3 A3 C4 41 C0  ..o..!L.......A.
#     0050: 39 93 F3 F8 99 D6 22 17   5F 14 3E B9 93 04 DF D9  9....."._.>.....
#     0060: 70 01 64 CD 54 A8 80 3E   6F F4 92 C4 7B 0D A9 65  p.d.T..>o......e
#     0070: EA 09 33 5C F5 72 7D 32   CB C1 00 FA A4 7F 43 1E  ..3\.r.2......C.
#     0080: 15 C1 82 95 60 F2 1A 73   22 50 07 03 87 64 18 20  ....`..s"P...d.
#     0090: 40 36 3F 93 F7 2B 5E 5B   D3 6F 37 BF 3A 54 3D 26  @6?..+^[.o7.:T=&
#     00A0: 5A 88 30 EB A3 FC 11 F8   F1 A1 69 D8 30 DD FF F8  Z.0.......i.0...
#     00B0: 89 49 E2 6E 75 48 4F 12   8A B4 63 1B 25 85 1F FA  .I.nuHO...c.%...
#     00C0: B0 13 E0 7E 49 63 F5 41   8B 1E 8D A9 1F ED AD F9  ....Ic.A........
#     00D0: 70 32 66 55 A2 ED A3 61   C0 F6 1D C7 3E 88 4A 47  p2fU...a....>.JG
#     00E0: 93 71 33 C2 80 B0 A0 A0   08 AB 64 B5 E6 50 F6 2E  .q3.......d..P..
#     00F0: 26 2D 36 DE 06 0B 52 E8   78 B2 6D 91 50 A4 AB 6E  &-6...R.x.m.P..n
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.987 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: C1 25 BB 89 BA 8D A6 37   D9 10 F3 F0 01 65 F1 83  .%.....7.....e..
#     0010: 87 D5 52 FE 93 5D 3E ED   EF 80 B4 32 9B 74 EB 67  ..R..]>....2.t.g
#     0020: 18 C0 46 4D 1D 4F 1D E4   2E 9A 8E EC 5A CC 4F BA  ..FM.O......Z.O.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:12.988 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:13.038 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "5D 77 66 A0 AC 74 1B 98 F6 16 93 72 83 CC 92 8D 93 74 1F 62 1F 99 0C DE 24 4C 3B 22 B8 E8 2F 6E",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:13.087 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:13.087 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:13.087 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-16 09:46:13.087 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|ALL|01|main|2023-10-16 09:46:13.324 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-16 09:46:13.325 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (487 lines):
#   INFO  - 2023-10-16 09:46:26.547; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:26.901 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "39 3C 4D AA",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:44.000 UTC",
#       "not  after"         : "2024-01-14 09:45:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#           0010: 0E 6C D4 1B                                        .l..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "04 E0 D7 A6",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-16 09:45:46.000 UTC",
#       "not  after"         : "2024-01-14 09:45:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: C7 79 DF 06 28 AD 18 1E   8D 59 3C 80 89 21 44 D5  .y..(....Y<..!D.
#           0010: 0E 6C D4 1B                                        .l..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 67 0D B5 19 79 58 28 31   43 06 5E B2 61 45 18 86  g...yX(1C.^.aE..
#           0010: 0B FC 19 35                                        ...5
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-16 09:46:26.914 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:27.171 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.171 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:27.173 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-16 09:46:27.173 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.178 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.189 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.189 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.190 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-16 09:46:27.192 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5F 00 27 38 C5 B3 0F 81 07 8A FA 69 0E 24 5F 28 83 F3 FB A7 2A F0 45 CE 10 3A 88 50 BB 3A 45 D1",
#     "session id"          : "DC 78 7A 9B D7 C2 62 C1 F4 21 E5 A1 28 AA 69 D6 CD 8F 01 D9 33 3D 37 53 A0 7F F2 B8 8D 8A DF F6",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: C8 91 CB CD FD 0A F4 C0   A2 2D D9 8D C8 17 E9 D0  .........-......
#               0010: 3E FD 0F CB 5E C8 BD 0D   23 5F 3F B0 82 06 0C 33  >...^...#_?....3
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.213 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "B9 BC CE 83 C9 44 C5 69 3C 13 1C 66 CA 62 43 4F E5 5C 03 7F 7D 4D C3 5F B6 42 6A 5E D2 25 03 C1",
#     "session id"          : "DC 78 7A 9B D7 C2 62 C1 F4 21 E5 A1 28 AA 69 D6 CD 8F 01 D9 33 3D 37 53 A0 7F F2 B8 8D 8A DF F6",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: E9 9F EA 82 5E CC E1 7B   C0 01 B3 F2 B8 4F 20 5E  ....^........O ^
#             0010: 31 42 D1 C6 05 FA C8 95   B7 3C F2 F9 53 FD FA 65  1B.......<..S..e
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.214 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.214 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.214 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.214 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.215 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.217 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
#   javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.218 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.224 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.225 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
#   countdown value = 137438953472
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.226 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-16 09:46:27.230 UTC|EncryptedExtensions.java:171|Consuming EncryptedExt

[...truncated too long message...]

pl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1061)
# 	at java.base/java.security.AccessController.doPrivileged(Native Method)
# 	at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1008)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.fill(SslConnection.java:657)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.fill(NegotiatingClientConnection.java:102)
# 	at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:84)
# 	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:314)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14636ms
ok 75 stop command for single port in 17550ms
not ok 76 status detects locally running solr in 1511ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7566ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1536ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3002ms
ok 80 copying files around in 6623ms
ok 81 upconfig in 2661ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1236ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1246ms
not ok 84 Cleanup in 2549ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3310606 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3310606 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 4m 3s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/flcgwlt2u5zds

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8195 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8195/

All tests passed

Build Log:
[...truncated 1402 lines...]
BUILD FAILED in 1h 4m 47s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/ykpprkiiticvc

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8194 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8194/

2 tests failed.
FAILED:  org.apache.solr.search.TestFiltering.testRandomFiltering

Error Message:
java.lang.AssertionError: FAILURE: indexSize=31 iiter=9 qiter=399 request=[q, {! cache=false cost=171 tag=t}val_i:[00029 TO 00036] OR val_i:{00028 TO 00037}, fq, {!}id:RAND-1622624827 OR val_i:{00023 TO 00036], facet, true, facet.query, *:*, facet.query, {!key=multiSelect ex=t}*:*, facet.query, {!key=facetQuery}*:* AND val_s:{00007 TO 00028]]

Stack Trace:
java.lang.AssertionError: FAILURE: indexSize=31 iiter=9 qiter=399 request=[q, {! cache=false cost=171 tag=t}val_i:[00029 TO 00036] OR val_i:{00028 TO 00037}, fq, {!}id:RAND-1622624827 OR val_i:{00023 TO 00036], facet, true, facet.query, *:*, facet.query, {!key=multiSelect ex=t}*:*, facet.query, {!key=facetQuery}*:* AND val_s:{00007 TO 00028]]
	at __randomizedtesting.SeedInfo.seed([D7849F65C4DCE3AC:C8E73CA021FBA3A5]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.apache.solr.search.TestFiltering.testRandomFiltering(TestFiltering.java:576)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)


FAILED:  org.apache.solr.search.TestThinCache.testSimple

Error Message:
java.lang.AssertionError: expected:<0> but was:<1>

Stack Trace:
java.lang.AssertionError: expected:<0> but was:<1>
	at __randomizedtesting.SeedInfo.seed([D7849F65C4DCE3AC:EF37BB9BE32F377D]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.failNotEquals(Assert.java:835)
	at org.junit.Assert.assertEquals(Assert.java:120)
	at org.junit.Assert.assertEquals(Assert.java:146)
	at org.apache.solr.search.TestThinCache.testSimple(TestThinCache.java:139)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at org.junit.rules.ExternalResource$1.evaluate(ExternalResource.java:54)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 7389 lines...]
ERROR: The following test(s) have failed:
  - org.apache.solr.search.TestThinCache.testSimple (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestThinCache.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestThinCache.testSimple" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=D7849F65C4DCE3AC -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=ISO-8859-1

  - org.apache.solr.search.TestFiltering.testRandomFiltering (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.search.TestFiltering.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.search.TestFiltering.testRandomFiltering" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=D7849F65C4DCE3AC -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=ISO-8859-1


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 3m 19s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/vm5ptxsjjicpe

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8193 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8193/

All tests passed

Build Log:
[...truncated 1440 lines...]
BUILD FAILED in 1h 2m 48s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/a5t3kvfm4n5re

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8192 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8192/

All tests passed

Build Log:
[...truncated 1441 lines...]
BUILD FAILED in 1h 3m 20s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/45fhywnx6fxms

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8191 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8191/

All tests passed

Build Log:
[...truncated 1439 lines...]
BUILD FAILED in 1h 3m 1s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/pwubd6mqnauym

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any

[JENKINS] Solr » Solr-Check-main - Build # 8190 - Still Failing!

Posted by Apache Jenkins Server <je...@builds.apache.org>.
Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8190/

All tests passed

Build Log:
[...truncated 1256 lines...]
# ERROR: Error from server at http://localhost:39985/solr/admin/collections?action=CREATE&name=COLL_NAME&collection.configName=COLL_NAME&numShards=1&nrtReplicas=1&wt=json&version=2.2: org.apache.solr.cluster.placement.PlacementException: Not enough eligible nodes to place 1 replica(s) of type NRT for shard shard1 of collection COLL_NAME. Only able to place 0 replicas.
ok 56 Random placement plugin using ENV in 16096ms
ok 57 Check help command in 4362ms
ok 58 basic post with a type specified in 5535ms
ok 59 basic post WITHOUT a type specified in 11415ms
ok 60 crawling a directory in 4354ms
ok 61 crawling a web site in 4553ms
ok 62 commit and optimize and delete in 3619ms
ok 63 args mode in 6413ms
ok 64 stdin mode in 3229ms
ok 65 post solr log into solr via script in 9706ms
ok 66 post solr log into solr via cli in 6973ms
ok 67 allowPaths - backup in 16324ms
ok 68 start solr with ssl in 18820ms
not ok 69 use different hostname when not checking peer-name in 19749ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_ssl.bats, line 116)
#   `assert_output --partial 'Server refused connection'' failed
# Waiting up to 180 seconds to see Solr running on port 39985 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39985 (pid=2345672). Happy searching!
#
#     INFO  - 2023-10-15 14:26:31.014; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:26:31.055; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 14:26:31.573; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@7fcbe147(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 14:26:31.686; org.eclipse.jetty.util.ssl.SslContextFactory.config; Trusting all certificates configured for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12]
# WARN  - 2023-10-15 14:26:31.687; org.eclipse.jetty.util.ssl.SslContextFactory.config; No Client EndPointIdentificationAlgorithm configured for Client@4eed46ee[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12]
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (5 lines):
#   INFO  - 2023-10-15 14:26:41.329; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
#   INFO  - 2023-10-15 14:26:41.334; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   INFO  - 2023-10-15 14:26:41.707; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(solr-ssl,h=[test.solr.apache.org],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/69/ssl/solr-ssl.keystore.p12]
#
#   ERROR: IOException occurred when talking to server at: https://localhost:39985/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-10-15 14:26:43.061; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:26:43.065; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:8983/solr] to [https://127.0.0.1:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://127.0.0.1:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
not ok 70 start solr with ssl and auth in 10828ms
# (in test file test/test_ssl.bats, line 154)
#   `solr auth enable -type basicAuth -credentials name:password' failed
# Waiting up to 180 seconds to see Solr running on port 39985 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39985 (pid=2346470). Happy searching!
#
#     INFO  - 2023-10-15 14:26:51.003; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:26:51.008; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Couldn't get ZooKeeper host. Please make sure Solr is running in cloud mode, or a zkHost has been passed in.
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/70-3
# Last output:
# INFO  - 2023-10-15 14:26:54.151; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:26:54.166; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://localhost:8983/solr] to [https://localhost:8983].
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 71 start solr with client truststore and security manager in 18395ms
not ok 72 start solr with mTLS needed in 50129ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-wuG4KD/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Waiting up to 180 seconds to see Solr running on port 39985 [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39985 (pid=2348270). Happy searching!
#
#     Waiting up to 180 seconds to see Solr running on port 39986 [|]   [/]   [-]   [\]   [|]   [/]   [-]   [\]   [|]
# Started Solr server on port 39986 (pid=2348381). Happy searching!
#
#     INFO  - 2023-10-15 14:27:38.343; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:27:38.356; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 14:27:39.193; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4ebea12c(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 14:27:39.195; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4eed46ee(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 14:27:39.197; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(ca,h=[localhost],a=[],w=[]) for Client@3c0fae6c[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:39.253 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 15 EE 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:24.000 UTC",
#     "not  after"         : "2024-01-13 14:27:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 9F 6C 56 C3 87 92 C9   F8 A0 39 7E 4D 07 5C D0  E.lV......9.M.\.
#         0010: 86 EE 29 B6                                        ..).
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:39.265 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 95 58 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:15.000 UTC",
#     "not  after"         : "2024-01-13 14:27:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:39.289 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:39.983 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:39.983 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:39.989 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:39.989 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:39.999 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:40.022 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:40.023 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:40.027 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:40.033 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "F2 37 42 3E 6A AA E1 D6 97 34 93 6B E4 81 0C 8C A3 03 CB DD D8 6A 9B 2C 9A 68 95 CF EA 6A BD FC",
#   "session id"          : "EB A8 1A CB 57 67 54 07 ED 3E 68 76 F4 7C 7D 47 CF 99 5D 40 9C 2E E7 A9 74 97 CB 4D 7C 2B 8F 09",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: B2 CC F8 19 B0 9C F8 25   B7 CC 3A D5 15 6E 9F 72  .......%..:..n.r
#             0010: 47 A6 46 76 E5 BA DE E5   2B 6C 10 7F E5 87 7A 28  G.Fv....+l....z(
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.194 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "BC BD 8C 83 D9 A2 24 11 44 B8 51 EF 7D 0C 39 D8 8B BE 5E 6A E2 7E 68 08 80 D9 79 B7 0B 57 BE C5",
#   "session id"          : "EB A8 1A CB 57 67 54 07 ED 3E 68 76 F4 7C 7D 47 CF 99 5D 40 9C 2E E7 A9 74 97 CB 4D 7C 2B 8F 09",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 95 66 16 82 4E 70 FE DF   B4 F3 FC 9F 83 DB EC D0  .f..Np..........
#           0010: 3C EB 11 E0 73 0C 98 B3   F0 21 76 98 1D 8C 49 66  <...s....!v...If
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.194 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.195 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.196 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.197 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.197 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.281 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.282 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.282 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.284 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.285 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.306 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.308 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.315 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.318 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.318 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.318 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.318 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.318 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.323 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.330 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.331 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.331 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.337 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.338 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.338 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.338 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.339 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.340 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.340 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.342 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 25 23 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:20.000 UTC",
#       "not  after"         : "2024-01-13 14:27:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B0 6B 78 37 50 F2 62 63   94 33 4F AF 6E 1C 1D B4  .kx7P.bc.3O.n...
#           0010: CF 24 8A 45                                        .$.E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.345 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:40.576 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:40.577 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:40.577 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:40.577 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.606 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.609 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 7B F1 0C 26 31 C9 09 D3   A5 58 39 67 43 68 33 77  ...&1....X9gCh3w
#     0010: 7E 0E 4E C8 B5 17 52 20   83 10 37 32 37 A4 D1 89  ..N...R ..727...
#     0020: 88 D6 9D 25 F3 BA E7 F1   4F F8 B1 DA 88 1F 0E F7  ...%....O.......
#     0030: 66 67 82 87 EF 45 C6 9D   61 D8 36 A2 36 CD 1E DB  fg...E..a.6.6...
#     0040: D0 CA 67 59 3A CA C5 61   9F B3 17 8A 8A F6 EF 3D  ..gY:..a.......=
#     0050: 87 3F 2D E3 39 6C BA D8   34 65 CF C0 57 54 43 36  .?-.9l..4e..WTC6
#     0060: B9 4C 0E 21 8D E9 11 28   6A 71 95 0A F0 12 79 88  .L.!...(jq....y.
#     0070: B8 8F BA F0 30 77 52 91   07 71 E6 DC 82 3C 35 5C  ....0wR..q...<5\
#     0080: B8 4D 29 BD 61 F1 4B 77   06 C0 06 16 39 75 F5 05  .M).a.Kw....9u..
#     0090: DA 83 F0 EA 88 3C B4 1C   83 27 C0 3B C0 E5 3A 7E  .....<...'.;..:.
#     00A0: 7F 0F 76 1C EF D0 31 5B   57 A7 39 A7 54 0E 4D 18  ..v...1[W.9.T.M.
#     00B0: 2A B4 4F 76 67 64 AC 95   B1 80 27 8F A6 D7 A0 85  *.Ovgd....'.....
#     00C0: 9A F2 A5 A9 78 E4 46 F0   F9 E0 59 09 23 85 DC 2A  ....x.F...Y.#..*
#     00D0: EB D0 DE A8 2C 97 62 C9   E6 DD 84 3F 20 61 D2 54  ....,.b....? a.T
#     00E0: 6A 94 96 26 4D 87 F0 49   BA A9 F1 8D 40 9E BB DB  j..&M..I....@...
#     00F0: 74 B4 90 3E E9 E2 83 AE   6B F3 92 14 E9 86 C0 F7  t..>....k.......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.611 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BE 42 B4 DF 14 5B A1 77   D6 8B C2 28 73 ED 01 68  .B...[.w...(s..h
#     0010: 24 36 4A 1F FD F3 BA D1   60 05 BB 40 E2 46 6E AD  $6J.....`..@.Fn.
#     0020: 13 36 D2 48 C3 83 CD BA   00 C4 D2 92 82 8A 1C 77  .6.H...........w
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.612 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:40.613 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.613 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:40.613 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.613 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:40.614 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:40.614 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.614 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.619 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 15 EE 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:24.000 UTC",
#       "not  after"         : "2024-01-13 14:27:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 9F 6C 56 C3 87 92 C9   F8 A0 39 7E 4D 07 5C D0  E.lV......9.M.\.
#           0010: 86 EE 29 B6                                        ..).
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 DA D0 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:17.000 UTC",
#       "not  after"         : "2024-01-13 14:27:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#           0010: 7D 6D 2D 7C                                        .m-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.658 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 8F D2 23 0C 37 88 49 77   CE 69 14 D4 F0 99 92 1E  ..#.7.Iw.i......
#     0010: E4 BB 75 5E 6F 20 B7 10   34 D1 9F 96 0E 71 9A 72  ..u^o ..4....q.r
#     0020: 54 17 29 D9 5B A0 30 D6   CC 9A C4 33 42 5E 14 A0  T.).[.0....3B^..
#     0030: 59 48 6A 68 DA 6F DE 72   99 89 6E D9 64 09 AC 95  YHjh.o.r..n.d...
#     0040: 7F EF C9 A7 56 9B 5F 42   CC D6 6A 17 3E 08 AB 68  ....V._B..j.>..h
#     0050: 41 72 8D 3A 57 E3 76 AF   96 EB B8 4C 68 7D 32 50  Ar.:W.v....Lh.2P
#     0060: 27 22 4F ED 56 47 C8 1F   97 80 5F 35 17 2F A3 BC  '"O.VG...._5./..
#     0070: 2C 8A 95 10 9F 85 22 D6   F7 15 9D C4 63 83 7D 5B  ,.....".....c..[
#     0080: 55 36 3B B7 D0 CD 30 00   04 13 4E 5E 7F CF A1 D9  U6;...0...N^....
#     0090: D6 44 35 E6 48 BA 16 6D   04 7E 69 01 30 2F F7 38  .D5.H..m..i.0/.8
#     00A0: 85 A7 B8 9C 3C 68 49 04   72 CB 7F 8C FC 74 47 6E  ....<hI.r....tGn
#     00B0: 6A B1 F2 3B FF 8A 4E 0F   46 B1 8D AF 98 AB F5 92  j..;..N.F.......
#     00C0: 49 8B C5 67 E5 4A 8F 3C   82 60 3A 4F 90 63 5C 4E  I..g.J.<.`:O.c\N
#     00D0: 40 3B CB 33 DF 39 4C 2A   F4 68 0D 0F D6 3D F3 01  @;.3.9L*.h...=..
#     00E0: AA F5 96 D2 3C 46 75 12   22 21 89 94 90 2B 8E B8  ....<Fu."!...+..
#     00F0: DF 83 36 FB DB C0 4C F9   0B FA D1 DE 87 38 42 0F  ..6...L......8B.
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.660 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: BD 41 3C 03 87 30 28 18   2D 74 45 5E B2 AB 8F 52  .A<..0(.-tE^...R
#     0010: 82 3A EA E5 DD ED 8D 64   B2 7C 00 79 A3 7F 7B 15  .:.....d...y....
#     0020: AE 72 B7 F6 75 E1 8C A5   D1 2B 31 8C 2F 3B F1 BD  .r..u....+1./;..
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.664 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:40.744 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "B1 74 AD 53 82 9B D6 A9 3F 00 B4 F5 6E 84 10 1A CA CE 2D AE 9D B8 AC 80 BC A9 1D 8A B3 00 05 AD",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 14:27:41.124 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 14:27:41.125 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-10-15 14:27:42.145; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-10-15 14:27:42.149; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-10-15 14:27:42.486; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@fd0e5b6(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 14:27:42.488; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@5dbe30be(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-10-15 14:27:42.489; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fe89c24(ca,h=[localhost],a=[],w=[]) for Client@5cc126dc[provider=null,keyStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-wuG4KD/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:42.536 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "2A 15 EE 2D",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:24.000 UTC",
#     "not  after"         : "2024-01-13 14:27:24.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 45 9F 6C 56 C3 87 92 C9   F8 A0 39 7E 4D 07 5C D0  E.lV......9.M.\.
#         0010: 86 EE 29 B6                                        ..).
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:42.539 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3B 95 58 66",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:15.000 UTC",
#     "not  after"         : "2024-01-13 14:27:15.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:42.660 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:42.804 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.804 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:42.806 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:42.806 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.810 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.823 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.823 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:42.825 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "34 5A AD 21 8B 14 F3 85 C1 08 98 2A BC 60 D2 DA FD C9 15 A2 10 08 F0 8F BE CE 86 73 F9 AC 15 B9",
#   "session id"          : "3C 66 48 D6 AB 9E F3 79 0E 78 C7 A7 B8 57 8F 6D AC 95 05 63 5E B9 77 BB 0F 1D 94 38 AD 52 B0 AA",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: CB F4 8A 7F E6 A2 1C B6   26 00 F5 CE 97 DF 1C 82  ........&.......
#             0010: 22 6F CD F4 AC D0 5F 28   7C 45 58 3E 17 6E 25 46  "o...._(.EX>.n%F
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.921 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "72 BF 14 26 96 6C EE 95 49 DE 13 F5 FF 42 A9 5B 92 8E 58 8C B4 28 DD 78 9C 5D 4B E0 4A 2B 6B 43",
#   "session id"          : "3C 66 48 D6 AB 9E F3 79 0E 78 C7 A7 B8 57 8F 6D AC 95 05 63 5E B9 77 BB 0F 1D 94 38 AD 52 B0 AA",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: 68 3D 89 2A 28 B4 5D F2   A6 71 20 CF 59 4C 36 AE  h=.*(.]..q .YL6.
#           0010: EF 33 07 C1 B2 2F CB AE   52 22 97 2B C6 67 48 59  .3.../..R".+.gHY
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.922 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.922 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.927 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.928 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.930 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.930 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.930 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.930 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.931 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.948 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.949 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.951 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.954 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.955 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:42.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:42.955 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.956 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.956 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.956 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.957 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.957 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.958 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:42.958 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.960 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "1A 25 23 DE",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:20.000 UTC",
#       "not  after"         : "2024-01-13 14:27:20.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: B0 6B 78 37 50 F2 62 63   94 33 4F AF 6E 1C 1D B4  .kx7P.bc.3O.n...
#           0010: CF 24 8A 45                                        .$.E
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:42.960 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.020 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "58 DA D0 18",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-10-15 14:27:17.000 UTC",
#     "not  after"         : "2024-01-13 14:27:17.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#         0010: 7D 6D 2D 7C                                        .m-.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#         0010: DD 53 A6 B6                                        .S..
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.023 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 3B 9C 02 F0 86 10 6D B0   C5 E0 09 B5 73 09 31 48  ;.....m.....s.1H
#     0010: 00 14 0E B3 66 62 8B CE   82 6E 82 69 51 6E 1A E1  ....fb...n.iQn..
#     0020: 45 F5 D1 C1 AD 34 FF E4   12 E5 15 D2 2E CE 2D 0F  E....4........-.
#     0030: 1B E3 DF 84 AA 16 9D 99   65 D8 DE B3 6E 06 3F A1  ........e...n.?.
#     0040: 2A FE 19 73 26 55 CA 54   DF D5 25 7E 25 20 96 A5  *..s&U.T..%.% ..
#     0050: AD AF 37 33 6C E9 93 06   4D 5A 98 86 8A EE 7F 99  ..73l...MZ......
#     0060: E1 B2 77 8C 2E 4F 8C 82   16 C8 4D 32 77 EF D1 DF  ..w..O....M2w...
#     0070: A6 40 60 A4 1D 4F 12 D9   1E F3 44 EF D8 1A F0 D7  .@`..O....D.....
#     0080: AE FB 06 19 ED 7C 5C 2B   57 B2 27 8C FE 85 B1 00  ......\+W.'.....
#     0090: 15 04 0F 0D E3 A4 D8 2B   87 FA 1D 7F 3A 67 D4 80  .......+....:g..
#     00A0: 95 EC 26 48 62 2A 27 4B   DD 87 0D 22 E7 3C 3C B7  ..&Hb*'K...".<<.
#     00B0: 54 E1 77 49 6E 98 E4 7F   33 C2 8B 93 79 07 B4 BB  T.wIn...3...y...
#     00C0: 8E 3D 88 68 FE 33 1B 6E   68 B3 59 7D 4C A1 EE B7  .=.h.3.nh.Y.L...
#     00D0: AE E7 EE F1 9A A3 DE 24   E7 51 EA 68 BC F6 9E BE  .......$.Q.h....
#     00E0: EB F8 B5 B4 1C 40 11 3C   F7 99 05 62 97 C9 4D C8  .....@.<...b..M.
#     00F0: 41 C6 5A 0F D6 6E 84 BE   66 8E 79 C4 D0 C6 F3 EB  A.Z..n..f.y.....
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.025 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: EF 09 F7 04 99 7C 25 2D   B0 41 2A DF E3 B0 42 0D  ......%-.A*...B.
#     0010: E5 AE F1 80 61 87 72 85   78 41 53 57 9B 28 83 13  ....a.r.xASW.(..
#     0020: 31 6B 8E AF DB B5 D8 0E   79 4B EF D2 0E F6 EF 32  1k......yK.....2
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.027 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:43.027 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:43.027 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:43.028 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:43.028 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-10-15 14:27:43.028 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-10-15 14:27:43.028 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.029 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.030 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "2A 15 EE 2D",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:24.000 UTC",
#       "not  after"         : "2024-01-13 14:27:24.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 45 9F 6C 56 C3 87 92 C9   F8 A0 39 7E 4D 07 5C D0  E.lV......9.M.\.
#           0010: 86 EE 29 B6                                        ..).
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 DA D0 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:17.000 UTC",
#       "not  after"         : "2024-01-13 14:27:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#           0010: 7D 6D 2D 7C                                        .m-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.134 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: BF A4 0A 34 AE 4D DA E9   A8 AC 66 26 AF F1 9B 25  ...4.M....f&...%
#     0010: 60 F8 9A 50 41 F9 75 70   3C E6 2D D8 2B 5E 78 7C  `..PA.up<.-.+^x.
#     0020: 09 8F D0 E4 1E 6A B8 71   E8 F8 C7 0A C5 32 E8 05  .....j.q.....2..
#     0030: E1 D1 0E B2 A8 FD C6 D2   F2 75 0E 62 CF 35 BA 68  .........u.b.5.h
#     0040: BD 02 61 70 87 DD 5C 9D   EF 69 61 1F D0 07 7A 19  ..ap..\..ia...z.
#     0050: FF 7B 67 AA 0F 3D 49 66   A2 1A 90 4C 04 01 15 9E  ..g..=If...L....
#     0060: 7F B2 B0 AD F6 CD 64 1C   2A 2F D8 16 F9 B7 42 BD  ......d.*/....B.
#     0070: 5C F5 0F 8D A9 68 2D 0D   FA 17 EA 3E 6A AD 27 88  \....h-....>j.'.
#     0080: 03 64 08 37 B7 F3 4A 43   76 7B CC 1B FE FA F7 24  .d.7..JCv......$
#     0090: 6F 90 BD 68 7D 16 68 F7   36 F1 28 45 5D B9 10 D7  o..h..h.6.(E]...
#     00A0: 6F C7 1D 85 62 72 1D 1D   16 D7 DB 7D DA 9D 6F 5A  o...br........oZ
#     00B0: B6 57 38 E6 EC A8 58 90   61 00 73 59 DB 5A 44 64  .W8...X.a.sY.ZDd
#     00C0: 60 00 53 7E 8B 48 06 6C   BA 89 06 74 78 35 AD 9A  `.S..H.l...tx5..
#     00D0: A3 56 E9 7A 55 3B 93 5E   98 97 9A CB DC 97 52 FE  .V.zU;.^......R.
#     00E0: 29 82 13 00 EE 75 1F 60   EE 24 56 16 74 6D F9 67  )....u.`.$V.tm.g
#     00F0: 3E 93 18 64 E5 6B 4E A5   97 A2 C7 14 CF 9D F2 0E  >..d.kN.........
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.135 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 64 A9 20 F0 C8 E0 46 1E   97 13 85 D9 BE F3 A6 AC  d. ...F.........
#     0010: 79 D1 25 16 61 85 FD 9C   6B 87 70 8B 53 87 5F 25  y.%.a...k.p.S._%
#     0020: D1 D4 F2 4A EB 22 15 98   C0 F4 D6 78 41 C0 61 C5  ...J.".....xA.a.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.136 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-10-15 14:27:43.183 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "21 2F 12 7B A0 05 EF A0 8C 04 57 B0 B8 EC E7 F6 EE 03 0D 48 97 B1 50 05 BA 30 43 5A 3F E1 EA 5C",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-10-15 14:27:43.440 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-10-15 14:27:43.441 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:43.468 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:43.469 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:43.469 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-10-15 14:27:43.469 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (463 lines):
#   INFO  - 2023-10-15 14:27:56.842; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:57.407 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "58 DA D0 18",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:17.000 UTC",
#       "not  after"         : "2024-01-13 14:27:17.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#           0010: 7D 6D 2D 7C                                        .m-.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: D6 6B 43 3A 25 15 26 2C   57 92 C7 55 DD 72 56 1F  .kC:%.&,W..U.rV.
#           0010: DD 53 A6 B6                                        .S..
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "3B 95 58 66",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-10-15 14:27:15.000 UTC",
#       "not  after"         : "2024-01-13 14:27:15.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: CF 38 70 73 E5 D8 26 7B   E5 13 10 88 E3 9D D0 BD  .8ps..&.........
#           0010: 7D 6D 2D 7C                                        .m-.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-10-15 14:27:57.420 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:57.565 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.565 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:57.566 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-10-15 14:27:57.567 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.571 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.581 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.582 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.582 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-10-15 14:27:57.583 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "C6 F2 22 91 5C 45 1B 39 85 7D C8 93 2F 9C 5D D5 94 0B B5 42 71 D1 C2 47 CF 20 BC 2D 83 42 81 A3",
#     "session id"          : "A5 55 A0 F7 56 BD 7F B5 5F 5A C4 42 2B E4 CC E1 BA 40 94 91 1F DF 71 9F 04 A3 0F AD F2 48 28 ED",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: 68 24 35 42 C8 54 F3 C3   10 21 33 C8 97 09 5B 41  h$5B.T...!3...[A
#               0010: 1A DF AD B0 67 95 5E BC   B9 48 10 96 B4 2E 28 46  ....g.^..H....(F
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2s

[...truncated too long message...]

t Inc, C=US",
#     "not before"         : "2013-08-01 12:00:00.000 UTC",
#     "not  after"         : "2038-01-15 12:00:00.000 UTC",
#     "subject"            : "CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4E 22 54 20 18 95 E6 E3   6E E6 0F FA FA B9 12 ED  N"T ....n.......
#         0010: 06 17 8F 39                                        ...9
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "3E 8A 5D 07 EC 55 D2 32 D5 B7 E3 B6 5F 01 EB 2D DC E4 D6 E4",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "not before"         : "2015-10-19 07:43:30.000 UTC",
#     "not  after"         : "2035-10-19 07:43:30.000 UTC",
#     "subject"            : "CN=SZAFIR ROOT CA2, O=Krajowa Izba Rozliczeniowa S.A., C=PL",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           Key_CertSign
#           Crl_Sign
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 2E 16 A9 4A 18 B5 CB CC   F5 6F 50 F3 23 5F F8 5D  ...J.....oP.#_.]
#         0010: E7 AC F0 C8                                        ....
#         ]
#         ]
#       }
#     ]}
# )
# Exception in thread "main" org.apache.solr.client.solrj.SolrServerException: Server refused connection at: https://localhost:8983/solr/admin/info/system
# 	at org.apache.solr.client.solrj.impl.Http2SolrClient.request(Http2SolrClient.java:546)
# 	at org.apache.solr.client.solrj.SolrClient.request(SolrClient.java:1193)
# 	at org.apache.solr.cli.SolrCLI.getZkHost(SolrCLI.java:553)
# 	at org.apache.solr.cli.AuthTool.clearSecurityJson(AuthTool.java:469)
# 	at org.apache.solr.cli.AuthTool.handleBasicAuth(AuthTool.java:426)
# 	at org.apache.solr.cli.AuthTool.runTool(AuthTool.java:146)
# 	at org.apache.solr.cli.SolrCLI.main(SolrCLI.java:151)
# Caused by: java.net.ConnectException: Connection refused
# 	at java.base/sun.nio.ch.SocketChannelImpl.checkConnect(Native Method)
# 	at java.base/sun.nio.ch.SocketChannelImpl.finishConnect(SocketChannelImpl.java:774)
# 	at java.base/sun.nio.ch.SocketAdaptor.connect(SocketAdaptor.java:120)
# 	at org.eclipse.jetty.io.ClientConnector.connect(ClientConnector.java:428)
# 	at org.eclipse.jetty.http2.client.HTTP2Client.connect(HTTP2Client.java:461)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:146)
# 	at org.eclipse.jetty.http2.client.http.HttpClientTransportOverHTTP2.connect(HttpClientTransportOverHTTP2.java:135)
# 	at org.eclipse.jetty.client.HttpClient$1.connect(HttpClient.java:586)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:563)
# 	at org.eclipse.jetty.client.HttpClient$1.succeeded(HttpClient.java:559)
# 	at org.eclipse.jetty.util.SocketAddressResolver$Async.lambda$resolve$1(SocketAddressResolver.java:180)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:294)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
ok 74 SOLR-11740 check 'solr stop' connection in 14197ms
ok 75 stop command for single port in 17969ms
not ok 76 status detects locally running solr in 1491ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7405ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1445ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 3073ms
ok 80 copying files around in 7137ms
ok 81 upconfig in 2523ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1219ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1230ms
not ok 84 Cleanup in 2447ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 598378 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 598378 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.
> Get more help at https://help.gradle.org.

Deprecated Gradle features were used in this build, making it incompatible with Gradle 9.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

For more on this, please refer to https://docs.gradle.org/8.4/userguide/command_line_interface.html#sec:command_line_warnings in the Gradle documentation.

BUILD FAILED in 1h 2m 15s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/jchvtmn3wakos

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any