You are viewing a plain text version of this content. The canonical link for it is here.
Posted to builds@solr.apache.org by Apache Jenkins Server <je...@builds.apache.org> on 2023/09/22 07:46:56 UTC

[JENKINS] Solr » Solr-Check-main - Build # 8029 - Still Failing!

Build: https://ci-builds.apache.org/job/Solr/job/Solr-Check-main/8029/

1 tests failed.
FAILED:  org.apache.solr.cloud.overseer.ZkStateWriterTest.testZkStateWriterPendingAndNonBatchedBatchSizeExceeded

Error Message:
java.lang.AssertionError: The updates queue should be empty having been flushed

Stack Trace:
java.lang.AssertionError: The updates queue should be empty having been flushed
	at __randomizedtesting.SeedInfo.seed([B9D0A3712D56FA32:8CB57A01A70A3A72]:0)
	at org.junit.Assert.fail(Assert.java:89)
	at org.junit.Assert.assertTrue(Assert.java:42)
	at org.apache.solr.cloud.overseer.ZkStateWriterTest.testZkStateWriterPendingAndNonBatchedBatchSizeExceeded(ZkStateWriterTest.java:297)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.invoke(RandomizedRunner.java:1758)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$8.evaluate(RandomizedRunner.java:946)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$9.evaluate(RandomizedRunner.java:982)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$10.evaluate(RandomizedRunner.java:996)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.TestRuleSetupTeardownChained$1.evaluate(TestRuleSetupTeardownChained.java:48)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleThreadAndTestName$1.evaluate(TestRuleThreadAndTestName.java:45)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.forkTimeoutingTask(ThreadLeakControl.java:843)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$3.evaluate(ThreadLeakControl.java:490)
	at com.carrotsearch.randomizedtesting.RandomizedRunner.runSingleTest(RandomizedRunner.java:955)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$5.evaluate(RandomizedRunner.java:840)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$6.evaluate(RandomizedRunner.java:891)
	at com.carrotsearch.randomizedtesting.RandomizedRunner$7.evaluate(RandomizedRunner.java:902)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.SystemPropertiesRestoreRule$1.evaluate(SystemPropertiesRestoreRule.java:80)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleStoreClassName$1.evaluate(TestRuleStoreClassName.java:38)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.NoShadowingOrOverridesOnMethodsRule$1.evaluate(NoShadowingOrOverridesOnMethodsRule.java:40)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at org.apache.lucene.tests.util.TestRuleAssertionsRequired$1.evaluate(TestRuleAssertionsRequired.java:53)
	at org.apache.lucene.tests.util.AbstractBeforeAfterRule$1.evaluate(AbstractBeforeAfterRule.java:43)
	at org.apache.lucene.tests.util.TestRuleMarkFailure$1.evaluate(TestRuleMarkFailure.java:44)
	at org.apache.lucene.tests.util.TestRuleIgnoreAfterMaxFailures$1.evaluate(TestRuleIgnoreAfterMaxFailures.java:60)
	at org.apache.lucene.tests.util.TestRuleIgnoreTestSuites$1.evaluate(TestRuleIgnoreTestSuites.java:47)
	at org.junit.rules.RunRules.evaluate(RunRules.java:20)
	at com.carrotsearch.randomizedtesting.rules.StatementAdapter.evaluate(StatementAdapter.java:36)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl$StatementRunner.run(ThreadLeakControl.java:390)
	at com.carrotsearch.randomizedtesting.ThreadLeakControl.lambda$forkTimeoutingTask$0(ThreadLeakControl.java:850)
	at java.base/java.lang.Thread.run(Thread.java:829)




Build Log:
[...truncated 1588 lines...]
#   ERROR: IOException occurred when talking to server at: https://localhost:40821/solr/test/select
# --
#
# Please find the SOLR_HOME snapshot for failed test #2 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/69-2
# Last output:
# INFO  - 2023-09-22 07:43:04.062; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-22 07:43:04.066; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [https://127.0.0.1:40821/solr] to [https://127.0.0.1:40821].
# WARN  - 2023-09-22 07:43:04.870; org.apache.solr.common.cloud.SolrZkClient; Using default ZkCredentialsInjector. ZkCredentialsInjector is not secure, it creates an empty list of credentials which leads to 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
# WARN  - 2023-09-22 07:43:04.903; org.apache.solr.common.cloud.SolrZkClient; Using default ZkACLProvider. DefaultZkACLProvider is not secure, it creates 'OPEN_ACL_UNSAFE' ACLs to Zookeeper nodes
ok 70 start solr with ssl and auth in 16669ms
ok 71 start solr with client truststore and security manager in 19609ms
not ok 72 start solr with mTLS needed in 52452ms
# (in test file test/test_ssl.bats, line 325)
#   `solr start -c -z localhost:${ZK_PORT} -p ${SOLR2_PORT}' failed
# /tmp/bats-run-orBz3I/test/72/ssl
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Certificate reply was installed in keystore
# Certificate was added to keystore
# Certificate was added to keystore
# Warning: Available entropy is low. As a result, use of the UUIDField, SSL, or any other features that require
# RNG might not work properly. To check for the amount of available entropy, use 'cat /proc/sys/kernel/random/entropy_avail'.
#
# Waiting up to 180 seconds to see Solr running on port 40821 [|]   [/]   [-]   [\]
# Started Solr server on port 40821 (pid=792448). Happy searching!
#
#     Warning: Available entropy is low. As a result, use of the UUIDField, SSL, or any other features that require
# RNG might not work properly. To check for the amount of available entropy, use 'cat /proc/sys/kernel/random/entropy_avail'.
#
# Waiting up to 180 seconds to see Solr running on port 40822 [|]   [/]   [-]   [\]   [|]   [/]   [-]
# Started Solr server on port 40822 (pid=792550). Happy searching!
#
#     INFO  - 2023-09-22 07:44:06.772; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-22 07:44:06.776; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-22 07:44:07.560; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@423e4cbb(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-22 07:44:07.563; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@649725e3(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-22 07:44:07.565; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@3c0fae6c(ca,h=[localhost],a=[],w=[]) for Client@743cb8e0[provider=null,keyStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-22 07:44:07.648 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 E7 E2 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-22 07:43:52.000 UTC",
#     "not  after"         : "2023-12-21 07:43:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#         0010: 13 B0 37 1B                                        ..7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA 46 A5 D4 4A 90 5D B2   DF 6F CE C4 94 61 2E 6D  .F..J.]..o...a.m
#         0010: 71 DD C7 40                                        q..@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 12 CC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-22 07:43:46.000 UTC",
#     "not  after"         : "2023-12-21 07:43:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#         0010: D0 8D 52 2E                                        ..R.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#         0010: 13 B0 37 1B                                        ..7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-22 07:44:07.653 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 29 03 E7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-22 07:43:44.000 UTC",
#     "not  after"         : "2023-12-21 07:43:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#         0010: D0 8D 52 2E                                        ..R.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 12 CC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-22 07:43:46.000 UTC",
#     "not  after"         : "2023-12-21 07:43:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#         0010: D0 8D 52 2E                                        ..R.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#         0010: 13 B0 37 1B                                        ..7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-22 07:44:07.686 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-22 07:44:08.243 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:08.243 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-22 07:44:08.244 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-22 07:44:08.244 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:08.249 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:08.258 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:08.258 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:08.258 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:08.260 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "4F 7B 38 5D 81 57 98 2E D5 71 A1 AA AF B8 8F AD 61 C6 B0 D1 A2 69 C7 79 29 69 89 50 48 92 D8 41",
#   "session id"          : "E5 08 E4 8A 3A AB 35 AE DA 83 8D F8 8C 3B 91 8A 6C C9 43 76 E9 E3 D0 27 DD E5 09 01 BA 35 A6 6D",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 38 46 3B 42 26 10 16 B5   DE 3A 30 01 AC D9 48 CA  8F;B&....:0...H.
#             0010: 31 92 A0 24 A9 B0 06 42   8B 77 15 F9 E9 BD D6 53  1..$...B.w.....S
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.597 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "B7 BD 8A B4 6D A0 61 C3 F8 79 86 71 30 22 4E 67 8C 23 D8 2C 37 AA 60 41 95 04 D4 1A 1C 13 20 EA",
#   "session id"          : "E5 08 E4 8A 3A AB 35 AE DA 83 8D F8 8C 3B 91 8A 6C C9 43 76 E9 E3 D0 27 DD E5 09 01 BA 35 A6 6D",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: BE 29 1B 30 B2 74 BF 4F   3D 06 D7 EA 67 C9 BC 6F  .).0.t.O=...g..o
#           0010: E8 54 EB 62 21 5A 80 00   94 0B 5A 42 9B 5C 06 37  .T.b!Z....ZB.\.7
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.598 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.598 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.599 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.600 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.600 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.600 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.600 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.600 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.601 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.601 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.606 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.610 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.610 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.611 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.618 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.619 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.620 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.623 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.623 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.623 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.624 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.624 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.624 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:08.624 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:08.624 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.625 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.625 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.625 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.625 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.626 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.626 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:08.627 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.628 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 11 F7 57",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-22 07:43:48.000 UTC",
#       "not  after"         : "2023-12-21 07:43:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#           0010: 13 B0 37 1B                                        ..7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 6D 74 6B 66 30 6C 7B   E9 02 22 C1 D3 5D FF 27  Fmtkf0l..."..].'
#           0010: 83 2E 25 5E                                        ..%^
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.629 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-22 07:44:08.666 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-22 07:44:08.666 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-22 07:44:08.666 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-22 07:44:08.666 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:08.719 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 12 CC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-22 07:43:46.000 UTC",
#     "not  after"         : "2023-12-21 07:43:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#         0010: D0 8D 52 2E                                        ..R.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#         0010: 13 B0 37 1B                                        ..7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:09.102 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 5D EA 33 D2 B5 E3 5A 75   8F 64 D0 E8 AA DE 67 66  ].3...Zu.d....gf
#     0010: 7F 8F 96 AA FC 7B FF 63   1C CA 7F B3 B1 9A 59 F8  .......c......Y.
#     0020: 08 A1 BE B2 27 4E 55 20   33 E2 1D 6D 7C DB 76 F3  ....'NU 3..m..v.
#     0030: FD 2A 6E ED F4 95 15 E0   24 48 96 D2 6E 9A C5 AA  .*n.....$H..n...
#     0040: 96 2C C7 F6 67 9D E2 80   55 7A 1C 68 F7 E2 86 A7  .,..g...Uz.h....
#     0050: 86 93 30 94 95 DA A5 AE   92 97 34 17 28 66 52 50  ..0.......4.(fRP
#     0060: 51 F3 5F AE AE C9 39 D1   92 BC 38 5B 98 4D A8 FF  Q._...9...8[.M..
#     0070: 40 D6 2F 50 E3 CC 63 B5   A3 20 D0 F2 52 96 23 A4  @./P..c.. ..R.#.
#     0080: A4 A5 CA 7D 37 65 C2 91   2F 9B 7F 00 49 5B 9D 2E  ....7e../...I[..
#     0090: 92 05 FA E7 27 58 EF 11   64 03 40 50 C5 AA 29 FE  ....'X..d.@P..).
#     00A0: 61 35 5C 63 C1 94 5A 42   4E EF 37 3F C5 B1 99 4D  a5\c..ZBN.7?...M
#     00B0: 8E 31 89 30 72 64 35 38   67 03 E9 6E 6E D3 63 72  .1.0rd58g..nn.cr
#     00C0: A0 F5 CF 7D 0A B8 92 94   78 CC 2A 46 23 E8 2C 61  ........x.*F#.,a
#     00D0: 44 DD 98 4D FE C6 12 F9   50 86 BB C2 DE F7 5A 8F  D..M....P.....Z.
#     00E0: 3A 2A E6 19 F7 D0 5D 86   69 EF D0 D9 0F 96 30 6A  :*....].i.....0j
#     00F0: 98 CF 59 28 3B 82 22 83   DD 30 55 3C 68 55 AB AE  ..Y(;."..0U<hU..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:09.103 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 1D D8 22 66 FF F2 2B 12   BF 06 96 1A 92 95 2E 07  .."f..+.........
#     0010: 38 5D DD C8 1E 24 50 DC   42 42 DE 4E 17 59 00 4E  8]...$P.BB.N.Y.N
#     0020: AD D6 04 3F D1 09 E0 2B   93 7B AB 54 7B 53 96 28  ...?...+...T.S.(
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:09.106 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-22 07:44:09.107 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:09.107 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-22 07:44:09.107 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:09.107 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-22 07:44:09.108 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:09.108 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:09.108 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:09.117 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 E7 E2 4A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-22 07:43:52.000 UTC",
#       "not  after"         : "2023-12-21 07:43:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#           0010: 13 B0 37 1B                                        ..7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 46 A5 D4 4A 90 5D B2   DF 6F CE C4 94 61 2E 6D  .F..J.]..o...a.m
#           0010: 71 DD C7 40                                        q..@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 12 CC B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-22 07:43:46.000 UTC",
#       "not  after"         : "2023-12-21 07:43:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#           0010: D0 8D 52 2E                                        ..R.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#           0010: 13 B0 37 1B                                        ..7.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:09.178 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 49 7A 66 C9 58 48 C3 A2   50 FE CB 8A FD 12 17 8C  Izf.XH..P.......
#     0010: F0 2E BA 5B 36 0C 8A E7   CA B9 6E 69 84 AF F9 2A  ...[6.....ni...*
#     0020: D2 CF 2F C9 3D 2F 54 5A   C5 65 1C 92 7B A8 7F C1  ../.=/TZ.e......
#     0030: 65 DB CA E1 72 D2 B8 2C   6F 98 61 F2 95 90 4A A3  e...r..,o.a...J.
#     0040: 05 39 1A C1 59 17 89 7E   DE AB E0 13 38 09 5B B5  .9..Y.......8.[.
#     0050: EC 37 49 42 E6 B9 B0 86   5E 23 A0 C4 C5 D8 BE 54  .7IB....^#.....T
#     0060: 07 BF AD 42 38 6A 7A A2   58 4C B9 D5 F4 CA A2 85  ...B8jz.XL......
#     0070: 15 E4 69 73 61 54 74 F3   2D 6E B2 23 E4 0B 6A E2  ..isaTt.-n.#..j.
#     0080: 8F A9 2F 82 AE 34 6C 61   E7 AC A0 12 52 8F BB 0C  ../..4la....R...
#     0090: 7C AB 0D 5E 91 77 66 AF   D8 BE 61 48 ED 3F 4D EC  ...^.wf...aH.?M.
#     00A0: BB E3 FC 7A 87 63 14 04   8C D0 EF DD 94 2F 27 2A  ...z.c......./'*
#     00B0: D4 07 C9 08 77 26 FF 7E   6F F1 2D FE E3 23 3D 22  ....w&..o.-..#="
#     00C0: 2A 1E CD 7C 58 3C C3 7A   F9 10 3F 4E 6C 63 54 96  *...X<.z..?NlcT.
#     00D0: 64 B9 3C 20 46 9B B7 62   43 30 AF 5E 91 B9 0E 41  d.< F..bC0.^...A
#     00E0: F0 ED 02 76 18 5E E0 38   66 04 97 B4 2A 66 2D E4  ...v.^.8f...*f-.
#     00F0: 99 AB 20 FD 28 49 04 47   5F 76 63 33 85 2C 83 09  .. .(I.G_vc3.,..
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:09.179 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 8D D7 6A 19 17 02 ED 70   77 19 A9 A6 B3 7B 42 53  ..j....pw.....BS
#     0010: 24 C7 49 31 E6 23 99 45   32 D2 54 75 3A 93 F5 A4  $.I1.#.E2.Tu:...
#     0020: BE 88 12 DD D7 1F F8 41   25 D5 88 B0 1D 0C 8C 7A  .......A%......z
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:09.193 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:09.268 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "1B 7A 2E 33 75 4E 74 62 B8 19 D2 89 EB 42 97 32 C4 38 8F DC F8 E6 B7 9D 33 04 4F 33 34 36 71 D5",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-22 07:44:09.702 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-22 07:44:09.703 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# INFO  - 2023-09-22 07:44:10.910; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.keyStorePassword
# INFO  - 2023-09-22 07:44:10.914; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
# INFO  - 2023-09-22 07:44:11.217; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@2a1edad4(client,h=[test.solr.apache.org],a=[/127.0.0.2],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-22 07:44:11.219; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@36b0fcd5(root,h=[localhost],a=[/127.0.0.1],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.truststore.p12]
# INFO  - 2023-09-22 07:44:11.219; org.eclipse.jetty.util.ssl.SslContextFactory; x509=X509@4fad94a7(ca,h=[localhost],a=[],w=[]) for Client@4c168660[provider=null,keyStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.keystore.p12,trustStore=file:///tmp/bats-run-orBz3I/test/72/ssl/client/solr-client.truststore.p12]
# javax.net.ssl|DEBUG|01|main|2023-09-22 07:44:11.250 UTC|SunX509KeyManagerImpl.java:164|found key for : client (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "71 E7 E2 4A",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-22 07:43:52.000 UTC",
#     "not  after"         : "2023-12-21 07:43:52.000 UTC",
#     "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#         0010: 13 B0 37 1B                                        ..7.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.37 Criticality=true
#         ExtendedKeyUsages [
#           clientAuth
#         ]
#       },
#       {
#         ObjectId: 2.5.29.15 Criticality=true
#         KeyUsage [
#           DigitalSignature
#           Non_repudiation
#           Key_Encipherment
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: test.solr.apache.org
#           IPAddress: 127.0.0.2
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: EA 46 A5 D4 4A 90 5D B2   DF 6F CE C4 94 61 2E 6D  .F..J.]..o...a.m
#         0010: 71 DD C7 40                                        q..@
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 12 CC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-22 07:43:46.000 UTC",
#     "not  after"         : "2023-12-21 07:43:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#         0010: D0 8D 52 2E                                        ..R.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#         0010: 13 B0 37 1B                                        ..7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-22 07:44:11.253 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "49 29 03 E7",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-22 07:43:44.000 UTC",
#     "not  after"         : "2023-12-21 07:43:44.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.19 Criticality=true
#         BasicConstraints:[
#           CA:true
#           PathLen:2147483647
#         ]
#       },
#       {
#         ObjectId: 2.5.29.17 Criticality=false
#         SubjectAlternativeName [
#           DNSName: localhost
#           IPAddress: 127.0.0.1
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#         0010: D0 8D 52 2E                                        ..R.
#         ]
#         ]
#       }
#     ]},
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 12 CC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-22 07:43:46.000 UTC",
#     "not  after"         : "2023-12-21 07:43:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#         0010: D0 8D 52 2E                                        ..R.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#         0010: 13 B0 37 1B                                        ..7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|01|main|2023-09-22 07:44:11.506 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-22 07:44:11.648 UTC|ServerNameExtension.java:261|Unable to indicate server name
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:11.648 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-22 07:44:11.650 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
# javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-22 07:44:11.650 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:11.654 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:11.663 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:11.663 UTC|PreSharedKeyExtension.java:633|No session to resume.
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:11.663 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:11.665 UTC|ClientHello.java:642|Produced ClientHello handshake message (
# "ClientHello": {
#   "client version"      : "TLSv1.2",
#   "random"              : "EE 68 AA F1 FD 41 B1 77 A4 A8 13 91 7F AA 57 BB 44 E7 FA 6D EF 52 A0 0E 51 D7 CB 36 08 92 50 28",
#   "session id"          : "EF 05 C4 34 F8 D7 AA 7E EC D0 4F C5 CC E2 F6 D8 27 89 FD 46 C9 89 52 66 B8 E5 C8 60 EC 48 2F ED",
#   "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#   "compression methods" : "00",
#   "extensions"          : [
#     "status_request (5)": {
#       "certificate status type": ocsp
#       "OCSP status request": {
#         "responder_id": <empty>
#         "request extensions": {
#           <empty>
#         }
#       }
#     },
#     "supported_groups (10)": {
#       "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#     },
#     "ec_point_formats (11)": {
#       "formats": [uncompressed]
#     },
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#     },
#     "application_layer_protocol_negotiation (16)": {
#       [h2]
#     },
#     "status_request_v2 (17)": {
#       "cert status request": {
#         "certificate status type": ocsp_multi
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       }
#     },
#     "extended_master_secret (23)": {
#       <empty>
#     },
#     "supported_versions (43)": {
#       "versions": [TLSv1.3, TLSv1.2]
#     },
#     "psk_key_exchange_modes (45)": {
#       "ke_modes": [psk_dhe_ke]
#     },
#     "key_share (51)": {
#       "client_shares": [
#         {
#           "named group": x25519
#           "key_exchange": {
#             0000: 4D B7 D1 8A 50 27 09 BC   9B 56 A8 49 95 2D F6 F6  M...P'...V.I.-..
#             0010: 1F FD 7A 67 45 0E 30 76   4E 02 75 D1 D9 E3 88 11  ..zgE.0vN.u.....
#           }
#         },
#       ]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.738 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
# "ServerHello": {
#   "server version"      : "TLSv1.2",
#   "random"              : "D0 9B 3D B2 62 39 FC 66 B3 D5 F0 41 DB F4 E4 FB 31 5A 32 E7 9F 51 0F 81 91 AF D6 C4 37 CB DC C6",
#   "session id"          : "EF 05 C4 34 F8 D7 AA 7E EC D0 4F C5 CC E2 F6 D8 27 89 FD 46 C9 89 52 66 B8 E5 C8 60 EC 48 2F ED",
#   "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#   "compression methods" : "00",
#   "extensions"          : [
#     "supported_versions (43)": {
#       "selected version": [TLSv1.3]
#     },
#     "key_share (51)": {
#       "server_share": {
#         "named group": x25519
#         "key_exchange": {
#           0000: A3 91 39 AF 21 E8 C4 8C   F0 BC 13 B3 47 06 E5 21  ..9.!.......G..!
#           0010: DE 6D F7 87 5F F8 94 57   FA BA 2E D5 AA 63 D8 51  .m.._..W.....c.Q
#         }
#       },
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.738 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.738 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.739 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.739 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.741 UTC|SSLExtensions.java:192|Consumed extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.741 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.741 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: ec_point_formats
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.741 UTC|SSLExtensions.java:207|Ignore unavailable extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: status_request_v2
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: extended_master_secret
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:11.742 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_versions
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:11.742 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: key_share
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: renegotiation_info
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.742 UTC|SSLExtensions.java:207|Ignore unavailable extension: pre_shared_key
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.753 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.754 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.756 UTC|ChangeCipherSpec.java:246|Consuming ChangeCipherSpec message
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.759 UTC|EncryptedExtensions.java:171|Consuming EncryptedExtensions handshake message (
# "EncryptedExtensions": [
#   "supported_groups (10)": {
#     "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#   },
#   "application_layer_protocol_negotiation (16)": {
#     [h2]
#   }
# ]
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.759 UTC|SSLExtensions.java:173|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.759 UTC|SSLExtensions.java:173|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.759 UTC|SSLExtensions.java:192|Consumed extension: supported_groups
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.759 UTC|SSLExtensions.java:192|Consumed extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: server_name
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.759 UTC|SSLExtensions.java:207|Ignore unavailable extension: max_fragment_length
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:11.760 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: supported_groups
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:11.760 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: application_layer_protocol_negotiation
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.761 UTC|CertificateRequest.java:979|Consuming CertificateRequest handshake message (
# "CertificateRequest": {
#   "certificate_request_context": "",
#   "extensions": [
#     "signature_algorithms (13)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "signature_algorithms_cert (50)": {
#       "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, ecdsa_sha1, rsa_pkcs1_sha1]
#     },
#     "certificate_authorities (47)": {
#       "certificate authorities": [
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country
#         CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country]
#     }
#   ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.761 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.761 UTC|SSLExtensions.java:192|Consumed extension: signature_algorithms_cert
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.761 UTC|SSLExtensions.java:192|Consumed extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.762 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.763 UTC|SSLExtensions.java:224|Populated with extension: signature_algorithms_cert
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:11.763 UTC|SSLExtensions.java:215|Ignore impact of unsupported extension: certificate_authorities
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.766 UTC|CertificateMessage.java:1172|Consuming server Certificate handshake message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "57 11 F7 57",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-22 07:43:48.000 UTC",
#       "not  after"         : "2023-12-21 07:43:48.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#           0010: 13 B0 37 1B                                        ..7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             serverAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 46 6D 74 6B 66 30 6C 7B   E9 02 22 C1 D3 5D FF 27  Fmtkf0l..."..].'
#           0010: 83 2E 25 5E                                        ..%^
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.766 UTC|SSLExtensions.java:173|Ignore unavailable extension: status_request
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.844 UTC|X509TrustManagerImpl.java:292|Found trusted certificate (
#   "certificate" : {
#     "version"            : "v3",
#     "serial number"      : "79 12 CC B0",
#     "signature algorithm": "SHA256withRSA",
#     "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "not before"         : "2023-09-22 07:43:46.000 UTC",
#     "not  after"         : "2023-12-21 07:43:46.000 UTC",
#     "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#     "subject public key" : "RSA",
#     "extensions"         : [
#       {
#         ObjectId: 2.5.29.35 Criticality=false
#         AuthorityKeyIdentifier [
#         KeyIdentifier [
#         0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#         0010: D0 8D 52 2E                                        ..R.
#         ]
#         ]
#       },
#       {
#         ObjectId: 2.5.29.19 Criticality=false
#         BasicConstraints:[
#           CA:true
#           PathLen:0
#         ]
#       },
#       {
#         ObjectId: 2.5.29.14 Criticality=false
#         SubjectKeyIdentifier [
#         KeyIdentifier [
#         0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#         0010: 13 B0 37 1B                                        ..7.
#         ]
#         ]
#       }
#     ]}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.847 UTC|CertificateVerify.java:1163|Consuming CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 20 0C 28 7D DD E8 05 B0   56 3A 97 A0 36 EE A4 1E   .(.....V:..6...
#     0010: 27 A4 A7 6B 4D 0B 59 D4   16 7D 91 25 FE 01 09 7B  '..kM.Y....%....
#     0020: 97 40 26 29 13 03 78 D9   E6 F0 4D 00 69 1F 18 D5  .@&)..x...M.i...
#     0030: FB D8 FB 61 AD 8C FB 8F   32 52 8A 3F 87 CC EA 3F  ...a....2R.?...?
#     0040: 5B 46 03 AC 32 8A 89 4C   93 DD 10 5F A1 9B E6 86  [F..2..L..._....
#     0050: BA 3B 9E 56 2D B6 48 DF   78 C6 56 18 89 50 44 76  .;.V-.H.x.V..PDv
#     0060: B7 18 DF 8C 75 18 18 36   54 B1 CB EB E0 E1 92 59  ....u..6T......Y
#     0070: D8 82 18 0D 3D 83 AD BC   14 92 38 98 0A 38 86 06  ....=.....8..8..
#     0080: 14 39 A0 E3 98 71 3B A7   47 A4 2C DF 96 94 B1 2D  .9...q;.G.,....-
#     0090: 65 D2 05 F4 A4 83 50 AE   4D 92 77 AC 35 41 46 4E  e.....P.M.w.5AFN
#     00A0: E4 E1 E1 2E F8 F1 A9 97   9A B0 F9 CE B4 25 F3 A8  .............%..
#     00B0: 5F 66 3B 50 05 A3 C3 C4   9E F2 D8 CF 63 3E C9 A0  _f;P........c>..
#     00C0: 6F 64 3A 2D 37 9E 69 F8   37 80 C1 B0 7B 4E 73 BE  od:-7.i.7....Ns.
#     00D0: 87 7A 15 79 0D 52 4E 79   D6 6B 59 F0 B5 65 B6 6A  .z.y.RNy.kY..e.j
#     00E0: 3F 8E EB D8 99 A6 75 BD   37 6C C0 DD 4C 27 22 BB  ?.....u.7l..L'".
#     00F0: 07 E2 33 71 8A 53 CA D0   AE 18 FE 8C 51 9B 91 64  ..3q.S......Q..d
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.849 UTC|Finished.java:898|Consuming server Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: 2A 35 CC 69 56 B0 E3 BB   17 E1 3B 56 46 34 32 B9  *5.iV.....;VF42.
#     0010: 8C 91 2B DA B1 5F 9E DA   78 A3 C5 12 DF 9E 88 5B  ..+.._..x......[
#     0020: 3B 11 B9 A8 F4 1E 69 68   16 19 71 FF B8 05 78 03  ;.....ih..q...x.
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.850 UTC|SSLCipher.java:1866|KeyLimit read side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-22 07:44:11.851 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:11.851 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp256r1_sha256
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-22 07:44:11.851 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:11.851 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp384r1_sha384
# javax.net.ssl|ALL|12|h2sc-1-thread-5|2023-09-22 07:44:11.851 UTC|X509Authentication.java:246|No X.509 cert selected for EC
# javax.net.ssl|WARNING|12|h2sc-1-thread-5|2023-09-22 07:44:11.851 UTC|CertificateMessage.java:1084|Unavailable authentication scheme: ecdsa_secp521r1_sha512
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.852 UTC|SunX509KeyManagerImpl.java:401|matching alias: client
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.853 UTC|CertificateMessage.java:1140|Produced client Certificate message (
# "Certificate": {
#   "certificate_request_context": "",
#   "certificate_list": [
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "71 E7 E2 4A",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-22 07:43:52.000 UTC",
#       "not  after"         : "2023-12-21 07:43:52.000 UTC",
#       "subject"            : "CN=test.solr.apache.org, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#           0010: 13 B0 37 1B                                        ..7.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.37 Criticality=true
#           ExtendedKeyUsages [
#             clientAuth
#           ]
#         },
#         {
#           ObjectId: 2.5.29.15 Criticality=true
#           KeyUsage [
#             DigitalSignature
#             Non_repudiation
#             Key_Encipherment
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: test.solr.apache.org
#             IPAddress: 127.0.0.2
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: EA 46 A5 D4 4A 90 5D B2   DF 6F CE C4 94 61 2E 6D  .F..J.]..o...a.m
#           0010: 71 DD C7 40                                        q..@
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
#   {
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 12 CC B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-22 07:43:46.000 UTC",
#       "not  after"         : "2023-12-21 07:43:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#           0010: D0 8D 52 2E                                        ..R.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#           0010: 13 B0 37 1B                                        ..7.
#           ]
#           ]
#         }
#       ]}
#     "extensions": {
#       <no extension>
#     }
#   },
# ]
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.875 UTC|CertificateVerify.java:1128|Produced client CertificateVerify handshake message (
# "CertificateVerify": {
#   "signature algorithm": rsa_pss_rsae_sha256
#   "signature": {
#     0000: 1F FE CF CA 34 42 81 D8   79 D3 7C 64 B4 FE 5F BC  ....4B..y..d.._.
#     0010: 16 BA A8 87 52 C4 4D A6   20 D7 3E 78 D8 DB 6C A6  ....R.M. .>x..l.
#     0020: D8 95 52 F6 1D 03 E7 05   B8 6E AE 15 E4 53 11 C0  ..R......n...S..
#     0030: 4A AB C1 1E 31 2B F3 D3   92 95 CE CB 5F FF 86 9C  J...1+......_...
#     0040: 4F 73 FA 01 DD 7E 6F E5   16 33 B1 6A 55 0F FC 8B  Os....o..3.jU...
#     0050: C2 39 3C DE F4 D2 18 2E   5B 4E 0D C7 22 BC 0B 65  .9<.....[N.."..e
#     0060: 84 AD E6 7D E3 E4 A0 64   B8 0F 81 3F C7 85 6F F1  .......d...?..o.
#     0070: 34 E5 8F 6F 2D 6D 14 0B   E6 5F 2B E5 E5 EA 92 F5  4..o-m..._+.....
#     0080: BE 6A DA CB ED BC 26 70   39 F7 88 30 14 19 7A CA  .j....&p9..0..z.
#     0090: 7F 37 18 47 86 59 DF C2   DD CC 0D B3 BE 15 F4 70  .7.G.Y.........p
#     00A0: B1 44 3D 25 FF 41 85 BA   00 C8 6C F9 C1 C6 0F 26  .D=%.A....l....&
#     00B0: 6D 40 23 92 B0 B9 8E D3   C3 6B 67 E1 49 AD E4 53  m@#......kg.I..S
#     00C0: 05 42 FC 71 06 CD BB 1A   C0 5B 62 C1 3C 86 85 89  .B.q.....[b.<...
#     00D0: 16 04 A9 BC BC FC 6F CB   57 9D 9E 71 30 2B 8E 4D  ......o.W..q0+.M
#     00E0: 3F 6F 31 E8 45 A7 2F 20   FC 1D 66 64 C9 9D D7 26  ?o1.E./ ..fd...&
#     00F0: 6E 02 6B 5A 7B EC C9 09   4D 30 FE 02 81 16 BC 17  n.kZ....M0......
#   }
# }
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.876 UTC|Finished.java:673|Produced client Finished handshake message (
# "Finished": {
#   "verify data": {
#     0000: E0 8D CF 8E 5B 6F 2D 5B   41 D0 9C 65 E3 A7 0E 44  ....[o-[A..e...D
#     0010: 6F DB F9 1A 48 E3 29 C0   E3 AC 5A 15 DD C5 4C BD  o...H.)...Z...L.
#     0020: 57 8C DF B0 ED A4 7F 66   5F 1D 3A 4D 06 57 BA 69  W......f_.:M.W.i
#   }'}
# )
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:11.877 UTC|SSLCipher.java:2020|KeyLimit write side: algorithm = AES/GCM/NOPADDING:KEYUPDATE
# countdown value = 137438953472
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-22 07:44:12.132 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-22 07:44:12.132 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-22 07:44:12.132 UTC|SSLSocketImpl.java:578|duplex close of SSLSocket
# javax.net.ssl|DEBUG|03|Finalizer|2023-09-22 07:44:12.132 UTC|SSLSocketImpl.java:1755|close the SSL connection (passive)
# javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:12.154 UTC|NewSessionTicket.java:328|Consuming NewSessionTicket message (
# "NewSessionTicket": {
#   "ticket_lifetime"      : "86,400",
#   "ticket_age_add"       : "<omitted>",
#   "ticket_nonce"         : "01",
#   "ticket"               : "C0 5D FD B3 17 B9 4C 1C A5 4F DB A7 D4 62 4E 1F 35 C3 93 6A FE 29 E9 51 75 CB 58 6A DF 03 9B 6F",
#   "extensions"           : [
#     <no extension>
#   ]
# }
# )
# javax.net.ssl|ALL|01|main|2023-09-22 07:44:12.428 UTC|SSLEngineImpl.java:752|Closing outbound of SSLEngine
# javax.net.ssl|WARNING|01|main|2023-09-22 07:44:12.430 UTC|SSLEngineOutputRecord.java:182|outbound has closed, ignore outbound application data
# javax.net.ssl|DEBUG|0E|h2sc-1-thread-2|2023-09-22 07:44:12.445 UTC|Alert.java:238|Received alert message (
# "Alert": {
#   "level"      : "warning",
#   "description": "close_notify"
# }
# )
#
# -- output does not contain substring --
# substring (1 lines):
#   Server refused connection
# output (491 lines):
#   INFO  - 2023-09-22 07:44:25.639; org.apache.solr.util.configuration.SSLConfigurations; Setting javax.net.ssl.trustStorePassword
#   javax.net.ssl|DEBUG|01|main|2023-09-22 07:44:25.918 UTC|X509TrustManagerImpl.java:79|adding as trusted certificates (
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "49 29 03 E7",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-22 07:43:44.000 UTC",
#       "not  after"         : "2023-12-21 07:43:44.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.19 Criticality=true
#           BasicConstraints:[
#             CA:true
#             PathLen:2147483647
#           ]
#         },
#         {
#           ObjectId: 2.5.29.17 Criticality=false
#           SubjectAlternativeName [
#             DNSName: localhost
#             IPAddress: 127.0.0.1
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#           0010: D0 8D 52 2E                                        ..R.
#           ]
#           ]
#         }
#       ]},
#     "certificate" : {
#       "version"            : "v3",
#       "serial number"      : "79 12 CC B0",
#       "signature algorithm": "SHA256withRSA",
#       "issuer"             : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "not before"         : "2023-09-22 07:43:46.000 UTC",
#       "not  after"         : "2023-12-21 07:43:46.000 UTC",
#       "subject"            : "CN=localhost, OU=Organizational Unit, O=Organization, L=Location, ST=State, C=Country",
#       "subject public key" : "RSA",
#       "extensions"         : [
#         {
#           ObjectId: 2.5.29.35 Criticality=false
#           AuthorityKeyIdentifier [
#           KeyIdentifier [
#           0000: 4A 55 72 B6 13 69 3E AD   4D F5 32 E0 83 E0 51 90  JUr..i>.M.2...Q.
#           0010: D0 8D 52 2E                                        ..R.
#           ]
#           ]
#         },
#         {
#           ObjectId: 2.5.29.19 Criticality=false
#           BasicConstraints:[
#             CA:true
#             PathLen:0
#           ]
#         },
#         {
#           ObjectId: 2.5.29.14 Criticality=false
#           SubjectKeyIdentifier [
#           KeyIdentifier [
#           0000: 60 E3 A8 A3 E4 1F 5C C9   74 1B 73 84 19 9D C3 5A  `.....\.t.s....Z
#           0010: 13 B0 37 1B                                        ..7.
#           ]
#           ]
#         }
#       ]}
#   )
#   javax.net.ssl|DEBUG|01|main|2023-09-22 07:44:25.929 UTC|SSLCipher.java:464|jdk.tls.keyLimits:  entry = AES/GCM/NoPadding KeyUpdate 2^37. AES/GCM/NOPADDING:KEYUPDATE = 137438953472
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-22 07:44:26.413 UTC|ServerNameExtension.java:261|Unable to indicate server name
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:26.414 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: server_name
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-22 07:44:26.415 UTC|SignatureScheme.java:295|Signature algorithm, ed25519, is not supported by the underlying providers
#   javax.net.ssl|WARNING|11|h2sc-1-thread-4|2023-09-22 07:44:26.415 UTC|SignatureScheme.java:295|Signature algorithm, ed448, is not supported by the underlying providers
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:26.419 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: cookie
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:26.428 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: renegotiation_info
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:26.428 UTC|PreSharedKeyExtension.java:633|No session to resume.
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:26.428 UTC|SSLExtensions.java:260|Ignore, context unavailable extension: pre_shared_key
#   javax.net.ssl|DEBUG|11|h2sc-1-thread-4|2023-09-22 07:44:26.430 UTC|ClientHello.java:642|Produced ClientHello handshake message (
#   "ClientHello": {
#     "client version"      : "TLSv1.2",
#     "random"              : "5F F3 D4 A0 F4 06 CD D3 5B 27 EA 20 6D 23 68 3F 9D 1C AA C0 A3 61 FD 70 FD C9 0D 26 72 2D F2 93",
#     "session id"          : "28 17 A5 F6 B4 B5 51 93 70 44 01 EC 5B AC 99 BC F2 ED 98 55 26 DA 68 71 46 5C C5 E4 FA 86 5D F2",
#     "cipher suites"       : "[TLS_AES_256_GCM_SHA384(0x1302), TLS_AES_128_GCM_SHA256(0x1301), TLS_CHACHA20_POLY1305_SHA256(0x1303), TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384(0xC02C), TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256(0xC02B), TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA9), TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xC030), TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCA8), TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xC02F), TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x009F), TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256(0xCCAA), TLS_DHE_DSS_WITH_AES_256_GCM_SHA384(0x00A3), TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x009E), TLS_DHE_DSS_WITH_AES_128_GCM_SHA256(0x00A2), TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384(0xC024), TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xC028), TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256(0xC023), TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xC027), TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x006B), TLS_DHE_DSS_WITH_AES_256_CBC_SHA256(0x006A), TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x0067), TLS_DHE_DSS_WITH_AES_128_CBC_SHA256(0x0040), TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384(0xC02E), TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384(0xC032), TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256(0xC02D), TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256(0xC031), TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384(0xC026), TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384(0xC02A), TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256(0xC025), TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256(0xC029), TLS_EMPTY_RENEGOTIATION_INFO_SCSV(0x00FF)]",
#     "compression methods" : "00",
#     "extensions"          : [
#       "status_request (5)": {
#         "certificate status type": ocsp
#         "OCSP status request": {
#           "responder_id": <empty>
#           "request extensions": {
#             <empty>
#           }
#         }
#       },
#       "supported_groups (10)": {
#         "versions": [x25519, secp256r1, secp384r1, secp521r1, x448, ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192]
#       },
#       "ec_point_formats (11)": {
#         "formats": [uncompressed]
#       },
#       "signature_algorithms (13)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "signature_algorithms_cert (50)": {
#         "signature schemes": [ecdsa_secp256r1_sha256, ecdsa_secp384r1_sha384, ecdsa_secp521r1_sha512, rsa_pss_rsae_sha256, rsa_pss_rsae_sha384, rsa_pss_rsae_sha512, rsa_pss_pss_sha256, rsa_pss_pss_sha384, rsa_pss_pss_sha512, rsa_pkcs1_sha256, rsa_pkcs1_sha384, rsa_pkcs1_sha512, dsa_sha256, ecdsa_sha224, rsa_sha224, dsa_sha224, ecdsa_sha1, rsa_pkcs1_sha1, dsa_sha1]
#       },
#       "application_layer_protocol_negotiation (16)": {
#         [h2]
#       },
#       "status_request_v2 (17)": {
#         "cert status request": {
#           "certificate status type": ocsp_multi
#           "OCSP status request": {
#             "responder_id": <empty>
#             "request extensions": {
#               <empty>
#             }
#           }
#         }
#       },
#       "extended_master_secret (23)": {
#         <empty>
#       },
#       "supported_versions (43)": {
#         "versions": [TLSv1.3, TLSv1.2]
#       },
#       "psk_key_exchange_modes (45)": {
#         "ke_modes": [psk_dhe_ke]
#       },
#       "key_share (51)": {
#         "client_shares": [
#           {
#             "named group": x25519
#             "key_exchange": {
#               0000: F9 7E B2 EF C0 CB 8C A2   9F BE 9E 1F 05 C9 18 6C  ...............l
#               0010: 66 4F C2 AC B8 CD 03 F4   0E C4 08 8A E3 33 0F 0F  fO...........3..
#             }
#           },
#         ]
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.450 UTC|ServerHello.java:867|Consuming ServerHello handshake message (
#   "ServerHello": {
#     "server version"      : "TLSv1.2",
#     "random"              : "5E 41 0D FA 29 7A A1 6D EF E0 2E 84 7C 25 37 40 95 D1 D3 27 76 9D 21 B0 1F DD E6 66 EC DD E0 99",
#     "session id"          : "28 17 A5 F6 B4 B5 51 93 70 44 01 EC 5B AC 99 BC F2 ED 98 55 26 DA 68 71 46 5C C5 E4 FA 86 5D F2",
#     "cipher suite"        : "TLS_AES_256_GCM_SHA384(0x1302)",
#     "compression methods" : "00",
#     "extensions"          : [
#       "supported_versions (43)": {
#         "selected version": [TLSv1.3]
#       },
#       "key_share (51)": {
#         "server_share": {
#           "named group": x25519
#           "key_exchange": {
#             0000: 7C 44 B5 7D A4 40 A1 D7   CD 96 EC 9E 9B 9C FF 3F  .D...@.........?
#             0010: 1E B2 2E 68 E9 18 9B A1   2C E3 1C 50 04 C4 9E 59  ...h....,..P...Y
#           }
#         },
#       }
#     ]
#   }
#   )
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.450 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.450 UTC|ServerHello.java:963|Negotiated protocol version: TLSv1.3
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.450 UTC|SSLExtensions.java:163|Ignore unsupported extension: server_name
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: max_fragment_length
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: ec_point_formats
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: application_layer_protocol_negotiation
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: status_request_v2
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.451 UTC|SSLExtensions.java:163|Ignore unsupported extension: extended_master_secret
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.451 UTC|SSLExtensions.java:192|Consumed extension: supported_versions
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.453 UTC|SSLExtensions.java:192|Consumed extension: key_share
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.453 UTC|SSLExtensions.java:163|Ignore unsupported extension: renegotiation_info
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.453 UTC|PreSharedKeyExtension.java:895|Handling pre_shared_key absence.
#   javax.net.ssl|DEBUG|12|h2sc-1-thread-5|2023-09-22 07:44:26.453 UTC|SSLExtensions.java:207|Ignore unavailable ex

[...truncated too long message...]

ty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:558)
# 	at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:379)
# 	at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:146)
# 	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:100)
# 	at org.eclipse.jetty.io.SelectableChannelEndPoint$1.run(SelectableChannelEndPoint.java:53)
# 	at org.apache.solr.common.util.ExecutorUtil$MDCAwareThreadPoolExecutor.lambda$execute$0(ExecutorUtil.java:289)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)
# 	at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)
# 	at java.base/java.lang.Thread.run(Thread.java:829)
# 	Suppressed: java.io.IOException: Broken pipe
# 		at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.flush(SslConnection.java:1138)
# 		at org.eclipse.jetty.io.WriteFlusher.flush(WriteFlusher.java:422)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:275)
# 		at org.eclipse.jetty.io.WriteFlusher.write(WriteFlusher.java:254)
# 		at org.eclipse.jetty.io.AbstractEndPoint.write(AbstractEndPoint.java:386)
# 		at org.eclipse.jetty.http2.HTTP2Flusher.process(HTTP2Flusher.java:292)
# 		at org.eclipse.jetty.util.IteratingCallback.processing(IteratingCallback.java:243)
# 		at org.eclipse.jetty.util.IteratingCallback.iterate(IteratingCallback.java:224)
# 		at org.eclipse.jetty.http2.HTTP2Session.frame(HTTP2Session.java:821)
# 		at org.eclipse.jetty.http2.HTTP2Session.frames(HTTP2Session.java:793)
# 		at org.eclipse.jetty.http2.client.HTTP2ClientConnectionFactory$HTTP2ClientConnection.onOpen(HTTP2ClientConnectionFactory.java:161)
# 		at org.eclipse.jetty.io.AbstractEndPoint.upgrade(AbstractEndPoint.java:451)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.replaceConnection(NegotiatingClientConnection.java:117)
# 		at org.eclipse.jetty.io.NegotiatingClientConnection.onFillable(NegotiatingClientConnection.java:87)
# 		... 11 more
# Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:439)
# 	at java.base/sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:306)
# 	at java.base/sun.security.validator.Validator.validate(Validator.java:264)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:313)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:276)
# 	at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)
# 	at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)
# 	... 22 more
# Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
# 	at java.base/sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
# 	at java.base/java.security.cert.CertPathBuilder.build(CertPathBuilder.java:297)
# 	at java.base/sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:434)
# 	... 28 more
ok 74 SOLR-11740 check 'solr stop' connection in 14019ms
ok 75 stop command for single port in 17532ms
not ok 76 status detects locally running solr in 1311ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 33)
#   `assert_output --partial "No Solr nodes are running."' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running.
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3511613 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #1 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/76-1
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3511613 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 77 status shell script ignores passed in -solrUrl cli parameter from user in 7686ms
not ok 78 status help flag outputs message highlighting not to use solrUrl. in 1281ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_status.bats, line 53)
#   `assert_output --partial 'usage: status'' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   usage: status
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3511613 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Please find the SOLR_HOME snapshot for failed test #3 at: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build/test-output/failure-snapshots/78-3
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3511613 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.
ok 79 listing out files in 2554ms
ok 80 copying files around in 6002ms
ok 81 upconfig in 2520ms
ok 82 zkcli.sh gets 'solrhome' from 'solr.home' system property in 1205ms
ok 83 zkcli.sh gets 'solrhome' from 'solrhome' command line option in 1213ms
not ok 84 Cleanup in 2293ms
# (from function `assert_output' in file /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats-assert/src/assert.bash, line 247,
#  in test file test/test_zz_cleanup.bats, line 36)
#   `assert_output --partial "No Solr nodes are running"' failed
#
# -- output does not contain substring --
# substring (1 lines):
#   No Solr nodes are running
# output (6 lines):
#
#   Found 1 Solr nodes:
#
#   Solr process 3511613 running on port 8983
#   WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
#   Solr at http://localhost:8983 not online.
# --
#
# Last output:
#
# Found 1 Solr nodes:
#
# Solr process 3511613 running on port 8983
# WARNING: URLs provided to this tool needn't include Solr's context-root (e.g. "/solr"). Such URLs are deprecated and support for them will be removed in a future release. Correcting from [http://localhost:8983/solr] to [http://localhost:8983].
# Solr at http://localhost:8983 not online.

> Task :solr:packaging:integrationTests FAILED

ERROR: The following test(s) have failed:
  - org.apache.solr.cloud.overseer.ZkStateWriterTest.testZkStateWriterPendingAndNonBatchedBatchSizeExceeded (:solr:core)
    Test output: /home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/core/build/test-results/test/outputs/OUTPUT-org.apache.solr.cloud.overseer.ZkStateWriterTest.txt
    Reproduce with: gradlew :solr:core:test --tests "org.apache.solr.cloud.overseer.ZkStateWriterTest.testZkStateWriterPendingAndNonBatchedBatchSizeExceeded" -Ptests.jvms=4 -Ptests.haltonfailure=false "-Ptests.jvmargs=-XX:TieredStopAtLevel=1 -XX:+UseParallelGC -XX:ActiveProcessorCount=1 -XX:ReservedCodeCacheSize=120m" -Ptests.seed=B9D0A3712D56FA32 -Ptests.multiplier=2 -Ptests.badapples=false -Ptests.file.encoding=US-ASCII


FAILURE: Build failed with an exception.

* Where:
Build file '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/solr/packaging/build.gradle' line: 301

* What went wrong:
Execution failed for task ':solr:packaging:integrationTests'.
> Process 'command '/home/jenkins/jenkins-slave/workspace/Solr/Solr-Check-main/.gradle/node/packaging/node_modules/bats/bin/bats'' finished with non-zero exit value 1

* Try:
> Run with --stacktrace option to get the stack trace.
> Run with --info or --debug option to get more log output.

* Get more help at https://help.gradle.org

Deprecated Gradle features were used in this build, making it incompatible with Gradle 8.0.

You can use '--warning-mode all' to show the individual deprecation warnings and determine if they come from your own scripts or plugins.

See https://docs.gradle.org/7.6/userguide/command_line_interface.html#sec:command_line_warnings

BUILD FAILED in 1h 1m 53s
624 actionable tasks: 624 executed

Publishing build scan...
https://ge.apache.org/s/z4jkjyqwo3h4k

Build step 'Invoke Gradle script' changed build result to FAILURE
Build step 'Invoke Gradle script' marked build as failure
Archiving artifacts
Recording test results
[Checks API] No suitable checks publisher found.
Email was triggered for: Failure - Any
Sending email for trigger: Failure - Any